Analysis
-
max time kernel
422s -
max time network
423s -
platform
windows10-1703_x64 -
resource
win10-20231215-it -
resource tags
arch:x64arch:x86image:win10-20231215-itlocale:it-itos:windows10-1703-x64systemwindows -
submitted
09-01-2024 21:39
Static task
static1
Behavioral task
behavioral1
Sample
Part-002.zip
Resource
win10-20231215-it
Behavioral task
behavioral2
Sample
Part-002/JDownloaderSetup.exe
Resource
win10-20231215-it
General
-
Target
Part-002/JDownloaderSetup.exe
-
Size
30.3MB
-
MD5
c3c3b50075bd5c87cf500c255dd833fd
-
SHA1
0b3593f15ebc8424919857d08d016b2cda2b5161
-
SHA256
a43fa3db0a053119f73a7422453e54318a258a947e8c0fda294b09c52b7459fc
-
SHA512
f9bd8c26a63b3d7cf6d6f0686a93720f9d3007ae2f196bf195815761b5a38f9fb81f2de6400abd842cc634ab68a14db6741436295a0d667e0b51099dbaf13c9d
-
SSDEEP
786432:w+gAvXxM03iJzr2tqG533+iRdJEozAw5P0r:w+tG0SJuJpOdoh90r
Malware Config
Signatures
-
Checks for any installed AV software in registry 1 TTPs 9 IoCs
Processes:
JDownloaderSetup.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast\Version JDownloaderSetup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast\Version JDownloaderSetup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast JDownloaderSetup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVG\AV\Dir JDownloaderSetup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVG\AV JDownloaderSetup.exe Key opened \REGISTRY\MACHINE\Software\Avast Software\Avast JDownloaderSetup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast JDownloaderSetup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV\Dir JDownloaderSetup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV JDownloaderSetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 21 IoCs
Processes:
Carrier.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exejava.exepid process 1788 Carrier.exe 1480 unpack200.exe 816 unpack200.exe 2868 unpack200.exe 1268 unpack200.exe 4032 unpack200.exe 756 unpack200.exe 3064 unpack200.exe 2184 unpack200.exe 924 unpack200.exe 1200 unpack200.exe 2708 unpack200.exe 376 unpack200.exe 2944 unpack200.exe 4156 unpack200.exe 3384 unpack200.exe 1604 unpack200.exe 4356 unpack200.exe 1164 unpack200.exe 1488 unpack200.exe 868 java.exe -
Loads dropped DLL 64 IoCs
Processes:
JDownloaderSetup.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exejava.exepid process 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 1480 unpack200.exe 816 unpack200.exe 2868 unpack200.exe 1268 unpack200.exe 4032 unpack200.exe 756 unpack200.exe 3064 unpack200.exe 2184 unpack200.exe 924 unpack200.exe 1200 unpack200.exe 2708 unpack200.exe 376 unpack200.exe 2944 unpack200.exe 4156 unpack200.exe 3384 unpack200.exe 1604 unpack200.exe 4356 unpack200.exe 1164 unpack200.exe 1488 unpack200.exe 868 java.exe 868 java.exe 868 java.exe 868 java.exe 868 java.exe 868 java.exe 868 java.exe 868 java.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2156 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Processes:
JDownloaderSetup.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8CF427FD790C3AD166068DE81E57EFBB932272D4\Blob = 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 JDownloaderSetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8CF427FD790C3AD166068DE81E57EFBB932272D4 JDownloaderSetup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8CF427FD790C3AD166068DE81E57EFBB932272D4\Blob = 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 JDownloaderSetup.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
JDownloaderSetup.exepid process 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe 208 JDownloaderSetup.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
JDownloaderSetup.exetasklist.exedescription pid process Token: SeDebugPrivilege 208 JDownloaderSetup.exe Token: SeDebugPrivilege 1392 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
JDownloaderSetup.exepid process 208 JDownloaderSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
JDownloaderSetup.exeCarrier.exedescription pid process target process PID 208 wrote to memory of 1788 208 JDownloaderSetup.exe Carrier.exe PID 208 wrote to memory of 1788 208 JDownloaderSetup.exe Carrier.exe PID 208 wrote to memory of 1788 208 JDownloaderSetup.exe Carrier.exe PID 1788 wrote to memory of 1480 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 1480 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 1480 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 816 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 816 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 816 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 2868 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 2868 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 2868 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 1268 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 1268 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 1268 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 4032 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 4032 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 4032 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 756 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 756 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 756 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 3064 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 3064 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 3064 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 2184 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 2184 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 2184 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 924 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 924 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 924 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 1200 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 1200 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 1200 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 2708 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 2708 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 2708 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 376 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 376 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 376 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 2944 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 2944 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 2944 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 4156 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 4156 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 4156 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 3384 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 3384 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 3384 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 1604 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 1604 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 1604 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 4356 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 4356 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 4356 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 1164 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 1164 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 1164 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 1488 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 1488 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 1488 1788 Carrier.exe unpack200.exe PID 1788 wrote to memory of 868 1788 Carrier.exe java.exe PID 1788 wrote to memory of 868 1788 Carrier.exe java.exe PID 1788 wrote to memory of 868 1788 Carrier.exe java.exe PID 208 wrote to memory of 3832 208 JDownloaderSetup.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Part-002\JDownloaderSetup.exe"C:\Users\Admin\AppData\Local\Temp\Part-002\JDownloaderSetup.exe"1⤵
- Checks for any installed AV software in registry
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5f3bf50163bb4e257419f910f803d8b2\Carrier.exe"C:\Users\Admin\AppData\Local\Temp\5f3bf50163bb4e257419f910f803d8b2\Carrier.exe" -Dexecuteafter=false "-Dregistry=true" -DinstallationDir="C:\Users\Admin\AppData\Local\JDownloader 2.0" -q "-Ddesktoplink=true" "-Dquicklaunch=true"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\rt.jar.pack" "jre\lib\rt.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\resources.jar.pack" "jre\lib\resources.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\management-agent.jar.pack" "jre\lib\management-agent.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\jsse.jar.pack" "jre\lib\jsse.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\ext\cldrdata.jar.pack" "jre\lib\ext\cldrdata.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\ext\access-bridge.jar.pack" "jre\lib\ext\access-bridge.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\ext\access-bridge-32.jar.pack" "jre\lib\ext\access-bridge-32.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\jfr.jar.pack" "jre\lib\jfr.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\ext\localedata.jar.pack" "jre\lib\ext\localedata.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\ext\jaccess.jar.pack" "jre\lib\ext\jaccess.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\ext\nashorn.jar.pack" "jre\lib\ext\nashorn.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
\??\c:\users\admin\appdata\local\temp\E4J892~1.TMP\jre\bin\java.exe"c:\users\admin\appdata\local\temp\E4J892~1.TMP\jre\bin\java.exe" -version3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\ext\zipfs.jar.pack" "jre\lib\ext\zipfs.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\ext\sunpkcs11.jar.pack" "jre\lib\ext\sunpkcs11.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\ext\sunmscapi.jar.pack" "jre\lib\ext\sunmscapi.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\ext\sunjce_provider.jar.pack" "jre\lib\ext\sunjce_provider.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\ext\sunec.jar.pack" "jre\lib\ext\sunec.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\ext\dnsns.jar.pack" "jre\lib\ext\dnsns.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\jce.jar.pack" "jre\lib\jce.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exe-r "jre\lib\charsets.jar.pack" "jre\lib\charsets.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\H2OCleanup.bat""2⤵
-
C:\Windows\SysWOW64\find.exefind /I "208"1⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 51⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "PID eq 208" /fo csv1⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5f3bf50163bb4e257419f910f803d8b2\Carrier.exeFilesize
3.5MB
MD54bfa04056cb9de1390da04eb2cda9f43
SHA13810cf1f48af5eabbc6a2aeeaeef97034ce9772c
SHA2567307c9b8652cc86a1d0fff82673b182a473836ed0657d9b9968bc2310c9bf68e
SHA51296a45a08b25a9baa49af388b458e15f1f8f03d5e8ec88eda386548b88daf292817b55bd0ec547cda43aec46f59c35a8cbacc498703f1d746c3eab687837e63a6
-
C:\Users\Admin\AppData\Local\Temp\5f3bf50163bb4e257419f910f803d8b2\Carrier.exeFilesize
6.3MB
MD58f84928a6dc2e263d1bc9c069b542ac0
SHA1a214430380b936de265c3011a13127b5a91d85b5
SHA25682c9e3b0f449bc02c5bc2faf6480ac3392e8e5dc0144091256eef85d775652d5
SHA512749ee7b5b6a55c8f3cad6db08bdb2768978a723e8ca0389eb0874b0ed5ff9dba6d612972a408066e5e5270f0b53dfb88f76a715d96ae0c0ab14bed7e34eb6a4c
-
C:\Users\Admin\AppData\Local\Temp\5f3bf50163bb4e257419f910f803d8b2\OfferSDK.dllFilesize
177KB
MD5dc6d53b383ae4a1389ec23e676afb866
SHA10bf4672988a05e292b99000ba5bcc805c1b16d0b
SHA25649ee3c4bd541bb0f930ca8743aa72063b182db59548254354b0ccc5276295826
SHA5128f4af4f5384a541e32a27e4489aeb75bd8d9002486ceb281acd62e592f9a3494d85622293b98d7bb5da9cf9f5803873db2bfe2431bfe7f6c9a516c091089367c
-
C:\Users\Admin\AppData\Local\Temp\5f3bf50163bb4e257419f910f803d8b2\Resources\OfferPage.htmlFilesize
1KB
MD57c9ba4307c8fa852cdc21898f0638980
SHA15f5b065c46aa8a629f95db2e4e47c5c5435c4622
SHA256c8a08eada415de5cfe32d174d78ffd8750cc9336be8f5688d87c8cda6d2ce7a1
SHA512fbbba6ecdefb39376e5c71439323b38f20ec47cc6c633d69da5440609b4dd545a8fcb2ffa9998b6c99ed4baa55c42496cc212058c8bbca99c4b9b6eca6278a56
-
C:\Users\Admin\AppData\Local\Temp\5f3bf50163bb4e257419f910f803d8b2\Resources\style.cssFilesize
17KB
MD5362fa1bf3819e45f44dea23764464801
SHA16ac9c0b66e3dcae13d04fe55467e06b98f245081
SHA256676c33de0bcd9869319dcde8158da5cd4b49499240592bf6b95122068b23bb11
SHA51234403c23927be775e96bf57a6ce702af8109cffb26608f5a49cd7e3cabbad358da30a0eaa36927cc7a9f01d61ba5f720ccf41c1f9dc5a97f1de940e83637fdca
-
C:\Users\Admin\AppData\Local\Temp\5f3bf50163bb4e257419f910f803d8b2\Resources\tis\Config.tisFilesize
291B
MD5bf5328e51e8ab1211c509b5a65ab9972
SHA1480dfb920e926d81bce67113576781815fbd1ea4
SHA25698f22fb45530506548ae320c32ee4939d27017481d2ad0d784aa5516f939545b
SHA51292bd7895c5ff8c40eecfdc2325ee5d1fb7ed86ce0ef04e8e4a65714fcf5603ea0c87b71afadb473433abb24f040ccabd960fa847b885322ad9771e304b661928
-
C:\Users\Admin\AppData\Local\Temp\5f3bf50163bb4e257419f910f803d8b2\Resources\tis\EventHandler.tisFilesize
10KB
MD51116d7747130f4552a91e61a3a6000b1
SHA1bc36996a664dab24b941ec263679c9d6322e61a2
SHA2565c09c6784f3fdc4a6b2998c4c9e02e366265ee5314c0f982859825576dc0eafd
SHA512af34413f242b64737ac9f7076e449b0d0485842d653d1cad12b54b868f09817d3595cd935ad7e03003d536127c173d624dd9a031c079fdb8f897ab0b7b9474e8
-
C:\Users\Admin\AppData\Local\Temp\5f3bf50163bb4e257419f910f803d8b2\Resources\tis\Log.tisFilesize
1014B
MD5cef7a21acf607d44e160eac5a21bdf67
SHA1f24f674250a381d6bf09df16d00dbf617354d315
SHA25673ed0be73f408ab8f15f2da73c839f86fef46d0a269607330b28f9564fae73c7
SHA5125afb4609ef46f156155f7c1b5fed48fd178d7f3395f80fb3a4fb02f454a3f977d8a15f3ef8541af62df83426a3316d31e1b9e2fd77726cf866c75f6d4e7adc2f
-
C:\Users\Admin\AppData\Local\Temp\5f3bf50163bb4e257419f910f803d8b2\Resources\tis\TranslateOfferTemplate.tisFilesize
2KB
MD5551029a3e046c5ed6390cc85f632a689
SHA1b4bd706f753db6ba3c13551099d4eef55f65b057
SHA2567b8c76a85261c5f9e40e49f97e01a14320e9b224ff3d6af8286632ca94cf96f8
SHA51222a67a8371d2aa2fdbc840c8e5452c650cb161e71c39b49d868c66db8b4c47d3297cf83c711ec1d002bc3e3ae16b1e0e4faf2761954ce56c495827306bab677e
-
C:\Users\Admin\AppData\Local\Temp\5f3bf50163bb4e257419f910f803d8b2\Resources\tis\ViewStateLoader.tisFilesize
16KB
MD585c33c8207f5fcb2d31c7ce7322771ac
SHA16b64f919e6b731447b9add9221b3b7570de25061
SHA256940ef5e9f28da759fbf3676fba6da5cc4199b78ffc4fefe078ab11d53e70fb0a
SHA512904188ab57cfb4f3d8c51eb55746ae2589852f271b9fa3840b82bda93f69c9f985e65f67169302d08818b707f36246f83f245470d5175dba5f0ad3a2482740c4
-
C:\Users\Admin\AppData\Local\Temp\5f3bf50163bb4e257419f910f803d8b2\app.icoFilesize
182KB
MD51f0fa25c629e147a347578677ef48c43
SHA155067928730e6781b657f26242c13ccc843c06ea
SHA256ca4422f74242954350de35efa9db4f92ff748ad278b56cecf02c0ca9192460f2
SHA512baa962508eb3c5c1277f01f25e68b10017d2e0d7dfe876253d54497aa6e9bd6f2f1b4d88fc82bea962e4c252654fcbaf3c12a07e2097dd57ea62aa9aa192f80a
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\unpack200.exeFilesize
163KB
MD58a7e94d3c3c2306ade5f2ea359cd46c3
SHA118c4a4549d990438ba734c4f7c3a4ef795e4297c
SHA25609147c13d553dc415af12deadcaa9f11c042b7b94ada6479cf2b598a2cc2db0b
SHA512220592f6af2ce1dcfedd0d29195d066508ca097604a2198f52d9a32b8d85e0953d62768c02922ac2a898fc410e6b7b9d80d870660ce602245182cc5f63cdbad8
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\lib\charsets.jar.packFilesize
1.0MB
MD5715bf147a0a6c08d80896c05b1f0a8f8
SHA1c32f60783b8f88d1156f281292840c9363161cd6
SHA25673f724323430aa8433d3f1a9a7cdc32f3450d9778253de40104cc3b7f9becedc
SHA5126b447fa4c2e5299ac66ee4ae74cb37930b71e1be685a45e9e09c297fce69aac6b0293101220f8d84bbdc8c7a2d3e217ff24e5c07f1dc4108ac3db9f7b5d1a931
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\lib\jce.jar.packFilesize
50KB
MD565b6533ab0d6f390ccc9278bf8537493
SHA1b188b52fa108e44504bbd8b7bcbcf6dc15a26779
SHA25673535750ca73c8e4a448e8df7dc3c052a1944e01248f694a5108ac9020b3fb6d
SHA512c2d0d68e24f0a000a9ee9ccc0b394dc185cd006c62e59715996b40cb6b8d204cf437e260ba022823a45133a5af5db5ef3e81e9a9ab7a86bfd0851d3dda00f452
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\lib\jfr.jar.packFilesize
273KB
MD5fb0a66cbe3d014a63489884b15373576
SHA124b80614d92b7c7e471e3cd4b2ab3c4c02f3c34f
SHA256c23d0cd1688c3072d4ff80e4db6748a3f12b904f42e72dbb5f62a722a0221b6b
SHA5126f3c14c57811ddd3f9a6bb613ff560c93fe9bc8f630ddadda2d09562fe23ebbd9fb12280138e7037d7997941cf5642f9262ca89ea3b620f0ec59fdf8719e5983
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\lib\jsse.jar.packFilesize
372KB
MD59465f34d94be46543693ac6fbf2f22a2
SHA1463e7384576a92908f7d7c82bae9a10c53ddac1c
SHA256999fb6c9fb66a1f616697ef5421b359d2019062f7a96d1c5acf8c89b5587f383
SHA512c9ad6b647001899791473a069cd2f470b59293f3aaac2eb9fde71e210ceefade07613542a44284cac994ba46c5c2538ee333f55d98a390e58a988b3c699e2b1e
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\lib\management-agent.jar.packFilesize
195B
MD5cac8766a81fb256c7107d100fb15ebf8
SHA1d899b37a7135c3283753d7469a1d999cdb2be685
SHA2569b0fb6851f18bf0cb174b4b2c21f086f08acabd9c63471f81f1dd8c7dc38556c
SHA51241c7456f897a32274bd6beebdbac016cabd542bfcfba8a878c64d02327c32c710b8738ad974b152fc3d5c3d73bff4b6232aca952e9ea03d91684f0bce2d4925f
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\lib\resources.jar.packFilesize
640KB
MD5de8216ed485bccb142343e6336d7190e
SHA1c8fe28ac16c278f9ee2e0af4df93885c283aa41e
SHA25690edde200b9e12ec12066509a696de94c2f88c2baef4e6d14eb891f7b0991d92
SHA512b0f73288aa141441f83564581216a2d58a643eb30fc90b6c1cead549467eaf9eeecfa414099c0d144f02bdb99cc819d3135cde0b0fde1ace0b9cd320d2aa1bac
-
C:\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\lib\rt.jar.packFilesize
512KB
MD50cb03b12b3c413f1b28135ab20c1e3b6
SHA1e82eac66d55c83c0044759646084c9bc93c44c5e
SHA2563f4ccd80c0ca9a965b0748b9e0b50d2742d78796c7ed64c9dd8548a898fe7d4a
SHA5129caf4917adf85d9275684d141d594ff111f652aeba98803d0b03e6dd61217c054fede953dd4f5428b7bc6a0b5eef2452ef506312eacb0449f9722bad9a81ce29
-
C:\Users\Admin\AppData\Local\Temp\i4j_nlog_1.logFilesize
961B
MD522557423aa3e768364cc2f27b09c697a
SHA18eee8b432b0354090dab7d57b28e60362a72e6eb
SHA2565ef4eb4aee9decba03364af572f3b65f085fe83c47c6d3e769c7ac870a6c965a
SHA512a6d5d1f5001636919a096cc8ce0bd8a633f38ba52c944792706a4807cf627fea0117b1b62e9efbc12caecde6212fcfbd82700f032832c61dc314969aa3d451e5
-
C:\Users\Admin\AppData\Local\Temp\i4j_nlog_1.logFilesize
1KB
MD583280c0eb688ded74da8c851a1d32279
SHA16d0ea1577396053cdffb9affb2321c88e46d51d1
SHA256ca33eeae533cff39c5e4e3902a15e927a9603f382aba2e2915e4f81531036690
SHA512265db248aa57fe398aa09d30bfc6963ac7b774fac859cfc4fd495dfa500d79013be48ecab0b0cc6760c9463dc742f1864c862f54b1ef3466d4044a73a8ef6ae1
-
C:\Users\Admin\AppData\Local\Temp\i4j_nlog_1.logFilesize
1KB
MD519cc26c4821d4da6ee90111e727c597d
SHA1165b59e2f4c71b0e6bf681bb26b4cc935ce3b22b
SHA256ad72607b0f37597e20ebb45c469c0d8fd3d3ab7ccce602eeaf3f465c20fb12b8
SHA512bcc0b72b66bd55be693666ada5cf211bada41181e51689a357a82f6d90aabdfbe0904f9cbdc3bc47080d3899462428cbbf627011b82ab551fde8c51b84e1d286
-
C:\Users\Admin\AppData\Local\Temp\i4j_nlog_1.logFilesize
3KB
MD52074ab5dc5d4047da390107a1b31c6c3
SHA110b2c6f0f93715c8f355934d6ef66958231a04a7
SHA2561070bce206d18816fcbe6b65ef5b3050006f68e7133a69b67c67372d1cbf5bc0
SHA51209be371eba9dece9e98b50241ea6b000b3cbcf93cd0d329d6cf7bfc8dbbe4f37ef60d586113dc6efd5047e7bd10c48cee0ec357487eaa2e4f92599b6ba35398e
-
C:\Users\Admin\AppData\Local\Temp\i4j_nlog_1.logFilesize
4KB
MD5a7da2d229197c4871df9805836a0a058
SHA1e1bbd6e1485b01a947813f0b6d5d738da229bcca
SHA256e602860f41e57121056280a076d1ab37abd5287f292ef05624fb7701670466c0
SHA5127af02c0d853d65c26e1080872890f3d7a5eaf7839333e823e1708c0339cd24c278ef3cae36fc88d28e16a28407b90d910e2439e606a6b83de39075280c8d2152
-
\Users\Admin\AppData\Local\Temp\5f3bf50163bb4e257419f910f803d8b2\H2OViewModels.dllMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\5f3bf50163bb4e257419f910f803d8b2\ServiceHide.dllFilesize
153KB
MD5ceb35d7cf1620eb138a71c23059ff910
SHA16c1ebbfbbc30c8fc02c9742131115d4f760d2ee8
SHA256b551b3066022b08e7da70e9bd191e691f8a26628633bd8524837319201ebd0e9
SHA512dc8847c712f0071ec1d3982e05eb5d79cad22484b8e9e1c3c644607fb8d3f08b00b9b94aaadd84d3bed8e802c677df5a090e08589fef8c3fc246a5cb3ee2d813
-
\Users\Admin\AppData\Local\Temp\5f3bf50163bb4e257419f910f803d8b2\msvcp140.dllFilesize
426KB
MD58ff1898897f3f4391803c7253366a87b
SHA19bdbeed8f75a892b6b630ef9e634667f4c620fa0
SHA25651398691feef7ae0a876b523aec47c4a06d9a1ee62f1a0aee27de6d6191c68ad
SHA512cb071ad55beaa541b5baf1f7d5e145f2c26fbee53e535e8c31b8f2b8df4bf7723f7bef214b670b2c3de57a4a75711dd204a940a2158939ad72f551e32da7ab03
-
\Users\Admin\AppData\Local\Temp\5f3bf50163bb4e257419f910f803d8b2\vcruntime140.dllFilesize
74KB
MD51a84957b6e681fca057160cd04e26b27
SHA18d7e4c98d1ec858db26a3540baaaa9bbf96b5bfe
SHA2569faeaa45e8cc986af56f28350b38238b03c01c355e9564b849604b8d690919c5
SHA5125f54c9e87f2510c56f3cf2ceeb5b5ad7711abd9f85a1ff84e74dd82d15181505e7e5428eae6ff823f1190964eb0a82a569273a4562ec4131cecfa00a9d0d02aa
-
\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\msvcr120.dllFilesize
941KB
MD5d4fca957f344859d45ad0274860180b4
SHA10bb8a7a895ab8875bb03048a4541029ee665a4f2
SHA256c084c86d1642a7775a36e85223cd80549bbee887d6e8b133f5953c37e7ce0e0a
SHA512934c799f8f155aa381a6c7d3208dc5086fa7bd44a114ad7f0bfe3906e555cd766122f43418d8978cb52538e0ab14fce9e6154064dcaa121e205527a3b718acfa
-
\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\msvcr120.dllFilesize
640KB
MD512c925ca190016a278957218566f904b
SHA11818f2aaf1d29bbc29020b93cd9c2564091d4774
SHA25663d56d31367febf052cfb430eab1cf9dd198556970ec4a1e2c1dbf6205cdffa5
SHA512d281ad8380bcccdce164b4511c99f6cfda23f73cacee2b2e6070237f3fb4be5d218e1c64eaadaf2a2b34e42e48ce1052128b4a231792295753056f8dfaa16301
-
\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\msvcr120.dllFilesize
704KB
MD569a872aca055ecdc2c8b5efe2383300f
SHA1f053afc6336188da50aece31f5760d8f08a3d614
SHA25641bcd9dec2062a649c6262f2a252bfd12efcfbf4742cab38590e5b55226e2154
SHA512802ecc9ac1d71bc3e22079560126aed790b9bccab379d4039c7ec169243a8e61c0dc3825a959abba1a1315d3192631c42d0440041c1aeead1285fd62466369f5
-
\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\msvcr120.dllFilesize
193KB
MD5736f922a5e59cc67d9f94b9e63fec46c
SHA167cca85949c0bd5bd05bdf01e6b736cf053bfe11
SHA25638211a8b41de35cb4a9a773b7dc77ba67faf9249e84531e31d4f8da8e2810ec4
SHA512defaa375948bb7be358c5feac2aec706ef719cc5839eeac466f1b9a8d0393d4fef379adccdb64d1819c27aed0c52f1d0f2caa0d1eccc93aca5e363a477a2d84e
-
\Users\Admin\AppData\Local\Temp\e4j892B.tmp_dir1704836919\jre\bin\msvcr120.dllFilesize
384KB
MD55b66c7c42b74b16238b8ed8d333deba9
SHA1f7b2e6e1bdb7be0f8649b4eec9da7c9b6b8fc2e5
SHA256e7c88cf334442e7727d5e3fe39b4c3f6771ef6fc676db1500979a18e0fc6a0db
SHA512ebd98bb36276a90c32d37b7af607e66226fee0a275c427484817667239f02d970324278e647ef2cefd1831da03df1807e9fd4185377269f0ab499f132af90e97
-
memory/208-2-0x0000000007040000-0x0000000007050000-memory.dmpFilesize
64KB
-
memory/208-97-0x00000000077E0000-0x00000000077FD000-memory.dmpFilesize
116KB
-
memory/208-159-0x000000000ABA0000-0x000000000ABA8000-memory.dmpFilesize
32KB
-
memory/208-144-0x000000000EC00000-0x000000000EF50000-memory.dmpFilesize
3.3MB
-
memory/208-143-0x0000000007E80000-0x0000000007EA2000-memory.dmpFilesize
136KB
-
memory/208-142-0x000000000D030000-0x000000000EBFC000-memory.dmpFilesize
27.8MB
-
memory/208-137-0x0000000008990000-0x0000000008A1C000-memory.dmpFilesize
560KB
-
memory/208-0-0x0000000073F80000-0x000000007466E000-memory.dmpFilesize
6.9MB
-
memory/208-23-0x0000000007530000-0x0000000007562000-memory.dmpFilesize
200KB
-
memory/208-31-0x0000000006FF0000-0x0000000006FF8000-memory.dmpFilesize
32KB
-
memory/208-39-0x0000000007680000-0x00000000076AA000-memory.dmpFilesize
168KB
-
memory/208-47-0x00000000076B0000-0x00000000076D8000-memory.dmpFilesize
160KB
-
memory/208-55-0x00000000076E0000-0x00000000076FA000-memory.dmpFilesize
104KB
-
memory/208-63-0x0000000007730000-0x0000000007760000-memory.dmpFilesize
192KB
-
memory/208-71-0x0000000007760000-0x0000000007786000-memory.dmpFilesize
152KB
-
memory/208-79-0x0000000007700000-0x000000000770A000-memory.dmpFilesize
40KB
-
memory/208-87-0x0000000007810000-0x000000000783C000-memory.dmpFilesize
176KB
-
memory/208-153-0x000000000F450000-0x000000000F94E000-memory.dmpFilesize
5.0MB
-
memory/208-114-0x0000000008180000-0x0000000008192000-memory.dmpFilesize
72KB
-
memory/208-212-0x0000000073F80000-0x000000007466E000-memory.dmpFilesize
6.9MB
-
memory/208-201-0x000000000FEE0000-0x000000000FF0E000-memory.dmpFilesize
184KB
-
memory/208-108-0x0000000007C50000-0x0000000007C90000-memory.dmpFilesize
256KB
-
memory/208-167-0x000000000FF10000-0x00000000104C4000-memory.dmpFilesize
5.7MB
-
memory/208-190-0x000000000FA50000-0x000000000FB50000-memory.dmpFilesize
1024KB
-
memory/208-4-0x0000000004AC0000-0x0000000004AC8000-memory.dmpFilesize
32KB
-
memory/208-150-0x000000000AB30000-0x000000000AB3C000-memory.dmpFilesize
48KB
-
memory/208-3-0x0000000007050000-0x0000000007434000-memory.dmpFilesize
3.9MB
-
memory/208-177-0x000000000EFF0000-0x000000000F082000-memory.dmpFilesize
584KB
-
memory/208-1291-0x0000000073F80000-0x000000007466E000-memory.dmpFilesize
6.9MB
-
memory/208-1-0x0000000000960000-0x00000000027AE000-memory.dmpFilesize
30.3MB
-
memory/868-1102-0x0000000002090000-0x0000000004090000-memory.dmpFilesize
32.0MB
-
memory/868-1107-0x0000000000090000-0x0000000000091000-memory.dmpFilesize
4KB
-
memory/868-1113-0x0000000002090000-0x0000000004090000-memory.dmpFilesize
32.0MB
-
memory/868-1096-0x0000000002090000-0x0000000004090000-memory.dmpFilesize
32.0MB
-
memory/1788-1279-0x0000000002B90000-0x0000000002B98000-memory.dmpFilesize
32KB
-
memory/1788-1206-0x0000000002A90000-0x0000000004A90000-memory.dmpFilesize
32.0MB
-
memory/1788-1253-0x0000000002A90000-0x0000000004A90000-memory.dmpFilesize
32.0MB
-
memory/1788-1258-0x0000000001070000-0x0000000001071000-memory.dmpFilesize
4KB
-
memory/1788-1269-0x0000000002A90000-0x0000000004A90000-memory.dmpFilesize
32.0MB
-
memory/1788-1276-0x0000000002AD0000-0x0000000002AD8000-memory.dmpFilesize
32KB
-
memory/1788-1277-0x0000000002B38000-0x0000000002B40000-memory.dmpFilesize
32KB
-
memory/1788-1278-0x0000000002B68000-0x0000000002B70000-memory.dmpFilesize
32KB
-
memory/1788-1280-0x0000000002B48000-0x0000000002B50000-memory.dmpFilesize
32KB
-
memory/1788-1282-0x0000000002A90000-0x0000000004A90000-memory.dmpFilesize
32.0MB
-
memory/1788-1283-0x0000000002B58000-0x0000000002B60000-memory.dmpFilesize
32KB
-
memory/1788-1287-0x0000000002B80000-0x0000000002B88000-memory.dmpFilesize
32KB
-
memory/1788-1286-0x0000000002A90000-0x0000000004A90000-memory.dmpFilesize
32.0MB
-
memory/1788-1200-0x0000000002A90000-0x0000000004A90000-memory.dmpFilesize
32.0MB
-
memory/1788-1284-0x0000000002B70000-0x0000000002B78000-memory.dmpFilesize
32KB
-
memory/1788-1281-0x0000000002B50000-0x0000000002B58000-memory.dmpFilesize
32KB
-
memory/1788-1192-0x0000000002A90000-0x0000000004A90000-memory.dmpFilesize
32.0MB
-
memory/1788-1275-0x0000000002A90000-0x0000000004A90000-memory.dmpFilesize
32.0MB
-
memory/1788-1285-0x0000000002B78000-0x0000000002B80000-memory.dmpFilesize
32KB