Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe
Resource
win10v2004-20240419-en
General
-
Target
SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe
-
Size
28.5MB
-
MD5
7ac2e514637c5c520aa3fce3f33f8be2
-
SHA1
a64ce0550a145a674dd08c7f1ba304631e3ec106
-
SHA256
a6d5598ef93cb503c3a5a90b09d0ca9bedb8cec4d85a6a6c06f7aaa4969a5f3a
-
SHA512
0cd78efc53d87d58c00c7d342757cdbf4d415481de2931613ba5171148d961dfbfd06d6d2b88c2f29671b011f1b5cdae6c25f9fbc6483b1ad3709bdf15256e63
-
SSDEEP
393216:IvAtM900k3ClteCQL/IFGohs872Sa/q3TiQ8UNFUik23q9gTJwN2GEE3WyxoaK:ODkHjIF5ZySaSYUNFXk269geN2x+pGaK
Malware Config
Signatures
-
Executes dropped EXE 16 IoCs
pid Process 3800 unpack200.exe 2428 unpack200.exe 4680 unpack200.exe 1036 unpack200.exe 3928 unpack200.exe 2204 unpack200.exe 4288 unpack200.exe 3672 unpack200.exe 4768 unpack200.exe 996 unpack200.exe 4024 unpack200.exe 4056 windowslauncher.exe 4092 unpack200.exe 460 Remote Support.exe 4052 windowslauncher.exe 1936 Session Elevation Helper -
Loads dropped DLL 64 IoCs
pid Process 3800 unpack200.exe 2428 unpack200.exe 4680 unpack200.exe 1036 unpack200.exe 3928 unpack200.exe 2204 unpack200.exe 4288 unpack200.exe 3672 unpack200.exe 4768 unpack200.exe 996 unpack200.exe 4024 unpack200.exe 4092 unpack200.exe 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 460 Remote Support.exe 460 Remote Support.exe 460 Remote Support.exe 460 Remote Support.exe 460 Remote Support.exe 460 Remote Support.exe 460 Remote Support.exe 460 Remote Support.exe 460 Remote Support.exe 460 Remote Support.exe 460 Remote Support.exe 460 Remote Support.exe 460 Remote Support.exe 460 Remote Support.exe 460 Remote Support.exe 460 Remote Support.exe 460 Remote Support.exe 4052 windowslauncher.exe 4052 windowslauncher.exe 4052 windowslauncher.exe 4052 windowslauncher.exe 4052 windowslauncher.exe 460 Remote Support.exe 4052 windowslauncher.exe 4052 windowslauncher.exe 4052 windowslauncher.exe 4052 windowslauncher.exe 4052 windowslauncher.exe 4052 windowslauncher.exe 4052 windowslauncher.exe 1936 Session Elevation Helper 1936 Session Elevation Helper 1936 Session Elevation Helper 1936 Session Elevation Helper 1936 Session Elevation Helper 1936 Session Elevation Helper 1936 Session Elevation Helper 1936 Session Elevation Helper -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 460 Remote Support.exe 460 Remote Support.exe 460 Remote Support.exe 460 Remote Support.exe 4052 windowslauncher.exe 1936 Session Elevation Helper -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 408 wrote to memory of 3800 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 89 PID 408 wrote to memory of 3800 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 89 PID 408 wrote to memory of 2428 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 90 PID 408 wrote to memory of 2428 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 90 PID 408 wrote to memory of 4680 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 91 PID 408 wrote to memory of 4680 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 91 PID 408 wrote to memory of 1036 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 92 PID 408 wrote to memory of 1036 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 92 PID 408 wrote to memory of 3928 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 93 PID 408 wrote to memory of 3928 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 93 PID 408 wrote to memory of 2204 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 95 PID 408 wrote to memory of 2204 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 95 PID 408 wrote to memory of 4288 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 97 PID 408 wrote to memory of 4288 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 97 PID 408 wrote to memory of 3672 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 98 PID 408 wrote to memory of 3672 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 98 PID 408 wrote to memory of 4768 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 100 PID 408 wrote to memory of 4768 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 100 PID 408 wrote to memory of 996 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 102 PID 408 wrote to memory of 996 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 102 PID 408 wrote to memory of 4024 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 103 PID 408 wrote to memory of 4024 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 103 PID 408 wrote to memory of 4056 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 104 PID 408 wrote to memory of 4056 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 104 PID 408 wrote to memory of 4092 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 106 PID 408 wrote to memory of 4092 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 106 PID 408 wrote to memory of 460 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 109 PID 408 wrote to memory of 460 408 SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe 109 PID 460 wrote to memory of 4052 460 Remote Support.exe 110 PID 460 wrote to memory of 4052 460 Remote Support.exe 110 PID 4052 wrote to memory of 1936 4052 windowslauncher.exe 111 PID 4052 wrote to memory of 1936 4052 windowslauncher.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen22.5496.19647.10510.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe"C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\crs-agent.jar.p2" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\crs-agent.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3800
-
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe"C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\charsets.jar.p2" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\charsets.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2428
-
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe"C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\jsse.jar.p2" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\jsse.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4680
-
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe"C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\jaccess.jar.p2" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\jaccess.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1036
-
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe"C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\sunpkcs11.jar.p2" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\sunpkcs11.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3928
-
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe"C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\openjsse.jar.p2" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\openjsse.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2204
-
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe"C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\legacy8ujsse.jar.p2" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\legacy8ujsse.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4288
-
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe"C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\cldrdata.jar.p2" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\cldrdata.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3672
-
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe"C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\access-bridge-64.jar.p2" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\access-bridge-64.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4768
-
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe"C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\sunmscapi.jar.p2" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\sunmscapi.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:996
-
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe"C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\rt.jar.p2" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\rt.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4024
-
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\windowslauncher.exe"C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\windowslauncher.exe" "-Xshare:dump"2⤵
- Executes dropped EXE
PID:4056
-
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\unpack200.exe"C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\unpack200.exe" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792997-5-app\customer-jar-with-dependencies.jar.p2" "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792997-5-app\customer-jar-with-dependencies.jar"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4092
-
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Remote Support.exe"C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Remote Support.exe" -cp "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\customer-jar-with-dependencies.jar" -Xmx512m -Xms5m -XX:MinHeapFreeRatio=15 -XX:MaxHeapFreeRatio=30 -Djava.util.Arrays.useLegacyMergeSort=true -Djava.net.preferIPv4Stack=true -Dsun.java2d.dpiaware=true -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2,TLSv1.3 -Dsun.awt.fontconfig=fontconfig.properties jwrapper.JWrapper "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\unrestricted\JWLaunchProperties-1714793007043-1"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\windowslauncher.exe"C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\windowslauncher.exe" -cp "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\customer-jar-with-dependencies.jar" -Xmx128m -Xms5m -Dsun.java2d.dpiaware=true "-Djava.library.path=C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete" com.aem.sdesktop.util.MouseMover 127.0.0.1 59908 127.0.0.1 59909 restricted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Session Elevation Helper"C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Session Elevation Helper" -cp "C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\customer-jar-with-dependencies.jar" -Xmx128m -Xms5m -Dsun.java2d.dpiaware=true "-Djava.library.path=C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete" com.aem.sdesktop.util.MouseMover 127.0.0.1 59979 127.0.0.1 59980 restricted_backup4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1936
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD56fe5a868e879acb6564d5b39d881363e
SHA148cdfb3398b89f628a67a382716b39d179e878aa
SHA256f0d6d4676a7c3d1694daaee04a78d29c1894fc6884964728aa812091a55cb96a
SHA512ea0f662d1f8134590dd4a031d8f717e4104caaa652e2085b4fa22d0170f124859b89b6fe70a1cd266b236db30044b827270d1b6c3f567a64dada7da99f54694d
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\branding\servicedeskUsmalsUbeG443\applet_splash.png
Filesize4KB
MD500c976b040e41e308dd0f17d7f92b982
SHA143f76d64028e98e7fac283499ea94cadea8c5481
SHA256b81904e71c3ce5bcb789da9558265181851c450be461039ce7f992a52e1223d1
SHA51280e214ac25253e824f077e10d7859388e01bf705e2b97a205284e2f6fb922c78d2605fefb99f48357ba8a42dd1b03eca31537a8b6ceceb257e4d0c047d83f6a4
-
Filesize
13B
MD58199887131477d02232d372bc808cfd5
SHA1c172ffd15c0fb02432429632272a066b8516e077
SHA256e4c596fe101978f244b8f74be616d62bbaae083f881928da51255b0dba50d440
SHA5128623a7e6bb4673572c47035280cecbf09d02a71de54f86a2a3376de080df33af8dbe0d2e5c460779a899ca3d51e5b4c7b1a264ed4089af40b05c187524606026
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-JWrapper-00102236230-complete\jwutils_win64.dll
Filesize243KB
MD53bc9749f5118f7d5f8c652cb59a60787
SHA1a570885b6085bb29ae31acf9b806ae7563ca2f56
SHA256061e2aa6fe2e27b6f2595b4703486c9bfb603cb276b780bc43f63b1f1b844198
SHA512fadfed1fc1ac700149bcce4343720465fc6fa5a96b4da48a7dfffcc0f3ccfc01593688f86d19a4da80bec8370130478fb6336110173d46282c38c443d723e661
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-JWrapper-00102236230-complete\nativesplash.png
Filesize8KB
MD508051133e368d61036576d3ed5b9cc14
SHA1817e7a73eb33ab39e3c4d8c99a00c9d05c64f5c5
SHA2565ac80b373a7de315cc803eea0fc640335369df062de52b53c2a4175af2c0a2a7
SHA51293400dc7b885e2f51942ccba11ed7f1ebc82b9d726aa3b5c11ea118bfa93d20594243449ce37195cf72387064514c01d0d2d38776d7d049e148050edf873b7ce
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\jwBuildVersion
Filesize11B
MD577e14c9d63faa3aedd47f0c313fc1d93
SHA155c00af369eca6beddbd3e55b12554f4842102d1
SHA2566bbea392cbb8a0e0f3d6fe27a8402f5aa1bfa61727c3f2c62c4fcd2ab97bca6f
SHA512b72c0052ee4819eae5def7130ba3558720970be9b36a9bfddc4b843818ae054be40c877601e2997cad1c6678842092e8cc157ac90f11bf77aaf31df244825525
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\unrestricted\jwLastRun
Filesize13B
MD5d09d018af0252cb5892d9c3c1368af3f
SHA191babc27ff9e3e7bda8cdaf417472439d959e7ab
SHA2560b832eb3b0d2fe2033f3b22de8bf062f05681518817cc210dab7c343f6e0cb4c
SHA512063b477ce8a39a66ded4a8b6eda3ad9fc467de7c46e4a6435890b31ee8fed571c724e2fc67efd37544709ce64dd11caf97657d3d941d1ae97987b5be41019b8e
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\awt.dll
Filesize1.4MB
MD5727db926e0e032ca5d96f485638693a1
SHA110307fc79c713c55d831557f73e7a64dd5eece17
SHA256863341b363ef99625f76347a421d49a971e690f7a66f21fa7f897eca41166d2e
SHA512b2da4046ad30dda95caed3c143c2c45df13e919888f5fd4bfadb7cce8e92c99f470bc9f98b0a651d14f4d0a17615b3c3e01e44376c12af4a81f016dbb643dd4b
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\java.dll
Filesize156KB
MD5c15b283310fcf536e39d816db8349990
SHA13db459debe6ebb1cd186e6b34687c62311367546
SHA25612687c8b9bc286807d3bcff6c26465a483900b05aa0da6d15871ea5e9a1ed96e
SHA5126c2193ad240a26fe12481057d9ce274c0bdd6e3f9491d9b7c611cff1fb5fb8aead309136076511c1e8037e2bbc5f930ea396f7ddfc1c08256f0356967b97228d
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\net.dll
Filesize96KB
MD51c5ae3178f47607de9674521c4ee26f2
SHA1f8991b430a2b8ded0982595e0ac50a2b9623d30d
SHA25608f3a8c065d952fcc5cae7a912adc46fe4d02029207b170feaae5410784fc851
SHA512b070cf3563025e6105acf04c872eb234b5891c99ed50db91050b329de55c9ee4339d3f2fdbac184901e6869c861d3cfe079d9eb88bd786183e3f7937b84c8cb8
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\nio.dll
Filesize59KB
MD544caf09544edb1c1a23c2c176d5f158e
SHA135ac012bbd0bf776640987b2e1be3b8f0cd3d18e
SHA25652445b77e22d3859dbf2d8734eac52812d35915ae46898181fd26e89ea30d42c
SHA5126e48610adf9bdaafeb959613a939b605e363518cd6c942926f6e21895dde03d54dc68f2406982fd7ed5907965c98ccd9cf96edb5056a58debf3b4fd9561b3c83
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\server\jvm.dll
Filesize8.6MB
MD52bd9330f2caff97fe12f4a330ae1f107
SHA13ab7e69839c584a16328d773a657245e19f32847
SHA256f8473f869f6ce88126eabb6ae4b1b765caf2780faabfb734287f33fa9af9df1e
SHA512aa3b99ac1ec80e4dc665ebcd5262cc6818f62734e9063ecf4b1bf6ec099c391d1eeb26108677a841b28ec2c558322dc3b114b75206d0aee196f659a263540c46
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\sunec.dll
Filesize133KB
MD534f2e1e15ae932b27b84f73d583955ef
SHA1879c84d17bde3d5fa67036d1f237777715f49908
SHA2565880fd50fc85fd5e48543040a1e2f86d1247a7a76dbe5a7eb989c6ab541d9042
SHA512ebed871de81620d471ff5351ebd2fdd713dc96e8dfcffba44e894fd75a416bced334bb1d6efbdf5a716910dc22bdce6cf561a69777e8aee241c0b5f66090eb14
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\sunmscapi.dll
Filesize37KB
MD563591f0004e481217756407c688fa72f
SHA11d5f20cc706bad501d886c349ac5eb47582389f3
SHA256c921495c997feabeb3d6fa9f4a01b3d460f4b11305f065ed6b19781b64f6b3a8
SHA5122673e071e62b2b074ba71ec227d04d41ca67b0018e79b8ee6859ebdedf74264ef875d689506f3b083b79013f2ed861406e5d0b9c4224920f028647a34a26f2d8
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\verify.dll
Filesize48KB
MD538bdc89172aca98a8df57cc6b0e5e8db
SHA12448538975c6daf00f4014d166ebb014d2374e8f
SHA256981dafa227a6ff4e1bf9a38d94800b28f1e39adc6fe5f76b9362206bd7346ebe
SHA5129fc3d626948f0990a311e3710786f6028e66cf75d6926c3d433526a349c93492cf7b7b1bfe7499eb88970e5342fd0201b58b7f227bfc009057dea7517b67b29f
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\zip.dll
Filesize77KB
MD5a9040ad98ad82934efbac3de57f9acc2
SHA1904e1b26aa21b7e7c065706ac4065ec43310b2a0
SHA256cf661a6d7172f64f3a7d9559eba32c3363ea26a913ae56420a0a184a42198320
SHA512848678c637349d59b5947a50ae6736882b260f00b31ed6b39d205a28bd9d9415e43bc7499c8cc5b3f1dc2b6b476f964583aa3bdb8fffbc6f35f363bad3d694ae
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792997-5-app\JWAuxiliaryArchive-Remote Support_linutils32
Filesize1B
MD593b885adfe0da089cdf634904fd59f71
SHA15ba93c9db0cff93f52b521d7420e43f6eda2784f
SHA2566e340b9cffb37a989ca544e6bb780a2c78901d3fb33738768511a30617afa01d
SHA512b8244d028981d693af7b456af8efa4cad63d282e19ff14942c246e50d9351d22704a802a71c3580b6370de4ceb293c324a8423342557d4e5c38438f0e36910ee
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792997-5-app\customer-jar-with-dependencies.jar
Filesize20.3MB
MD54f8a7d2ce6ebd06cb0f22c33a592404d
SHA1ed4afb70c49f38bfad39cc0b15d6683f5c854101
SHA256c559ab22bdf73f8e1f959a2c34b13bc765a67d5a3474ebecda6dd658e8329d04
SHA5126cfd6645a0278faa27e952c77cb8255f9d2f7597b78fb37597600dd595ef46379ee472ff8cf036ff71f6feccc237f92ff9cfa6ad55c93e5fd396e89d9195ca2c
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792997-5-app\customer-jar-with-dependencies.jar.p2
Filesize16.3MB
MD5aa023b48a18a5ba2589b8c3df918f454
SHA1f8091216ff75c9fb169fb5d64d9202d5dacad3d4
SHA25608e7756dcfdb552b6781be3203b2c85d2a2442d75ee7da89252f3df214115bf1
SHA51295a76dc1fccbc976f1da6a3e3c7e3981b6b043a4324cc1388be82a51c11714a3ee3503c6e61b37a9c2bb29ee2408b7b5f73dfd513a7217b003d96d4d6becd7a6
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\MSVCR100.dll
Filesize809KB
MD5366fd6f3a451351b5df2d7c4ecf4c73a
SHA150db750522b9630757f91b53df377fd4ed4e2d66
SHA256ae3cb6c6afba9a4aa5c85f66023c35338ca579b30326dd02918f9d55259503d5
SHA5122de764772b68a85204b7435c87e9409d753c2196cf5b2f46e7796c99a33943e167f62a92e8753eaa184cd81fb14361e83228eb1b474e0c3349ed387ec93e6130
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\unpack200.exe
Filesize195KB
MD5ffae954c09033df1ebcd4fe056b183f2
SHA1ee369cf9a6d4ab2f91a05fe84bf790fdda873669
SHA2562f5955b1d5bfd13f0c3b70c5a261df5d524a849a45c0d31f64478188cbe82665
SHA512be00fc9c0242d27e0f8cca0a0af39bcee502683dd0246e7453b6b4aebccd81ea221a4b14ccef48244920a180bc268132f7ca4584efa46a648a7bec9c1a7da3d4
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\bin\windowslauncher.exe
Filesize169KB
MD558af839323322202948776b70447becd
SHA156c3492866bfcd0f45aad645884b93e37ee2f01e
SHA2569e6c0101209ac39d3cc824b6be5119d2a891f8eb394e058eb55ff7df86744cf8
SHA51241cfa7e4e3afc279017c84caf07738af928c8beab009bb3e6a6cf04ba34a8944acd4b87fa93e96fc7fe3b2e22ef3b870e4cbf8e170625b36194503955660e842
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\charsets.jar
Filesize2.9MB
MD595c96b758db5b270c574027da01826e7
SHA19546a1e1817847d185fda77ed807ef5c93beb5e1
SHA256a5054fc62377f0eb99fe75e17f3c08ed5fb64f120e0797e6722f51db176aa87f
SHA512b973fe482d769078a24417c840287292634a38e6f049ba4a8d1f91a9e0d246f42f18a2e869f211bb2a9f7f079d060a59bc7b258cd01761cafd70df09d8877b6a
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\charsets.jar.p2
Filesize1022KB
MD518c2b0d47a25b263c555edc4305b3a62
SHA18a76193e200e5cefe782c617966282157a535087
SHA25662bcb3385c37e914be0ed0eb4e4c41f4b01a4a6123c784a8838aef53f35674fd
SHA512f805973fc99d46cd485806d9e4b5a4acf6462d9e900245a3e0208cbded18f78f8e1afb9ca29ed82876ecede79342932c1a4e2645a719ff1408f213f0c4c4b50a
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\crs-agent.jar
Filesize145KB
MD5d1f7a7fb0a46eda64b92d27bf48ff07c
SHA1e26e4f4b326e4e1e3a47a27b10f4f7335efecaf3
SHA2562ee219b2825d2174e5a03ff15a7bc3fa2a72d6322672abb2bc3be2ba7153f550
SHA5126034451481dcf2d4483e5edaae6c60197cb3a7f6c0ec726c7b0f8209632523d24ed7e4548df2942ed18e93c2cdd08a8d4be483d5329dd400aa97543de2b865e0
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\crs-agent.jar.p2
Filesize83KB
MD57618098477e433a3297beec060e38554
SHA1e57585e7f78f8290a534bae6bbe85e89bf59b671
SHA25675e2fcd8e5db747c4f2619c67e9a6898b083318dbab0b4276052593a9ed22825
SHA512fc46a67c3c7e3bcb0f3e8e2611a749692fe4c2cdf1ac89b9e5013ddc6f58bbab4d012e58cd85901f0d171c8ff5e9e5ca3c08811abac38d89776f67dd1b72b56e
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\access-bridge-64.jar
Filesize191KB
MD54d15b4682bd758875cbdafeff2fe6bf7
SHA1741e6dd1ed48fe2d60db86e55653f8c3a0ae94f8
SHA2565eb097f8dafde9fde128f4551ecba725e8343b637a7564a7fe70b2eb35c9e983
SHA51298758c04d675bf9712f1622d8fb4b04199980e0beda3aec5e81d8d41d3f7cd2f0de1e0e89c42d79235e02bc12b332e90912b4f843c35e9c5b8380c91cef7060f
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\access-bridge-64.jar.p2
Filesize68KB
MD5a9c19296cfff6730388171354874280e
SHA148db4034cd603d01603921f19bc623cb08e9c96c
SHA256e752dca0e0913fa722aa507538976e66e5425db6b3ef36001013b4398066b2b9
SHA51296517ff57b0328385b59a1f479e377e0563e316264fd6f9ca0c542c7c0b8669fe012e531ec4724fe85164dd950230c2bbbb1156408c67816832ea1163031231b
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\cldrdata.jar
Filesize3.7MB
MD5a2215ebc2eb45090237ab049407ff166
SHA1fa8780bb08079fa5a068257809c538b0b58afebd
SHA256b75092d771cee147d756f462e8b21dc846abc59199a3abda1ea2a04305e4117e
SHA512543efc2f87d7469d72c01d748176cacdfe160956c28721a5255266af40856c752a05ac75e9bc1b46faeb785e7a6323744e882ac996a8f3eb8bca4248154f3e7f
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\cldrdata.jar.p2
Filesize3.9MB
MD5c70a80c9ac49fa51b2b77fc62a7b839d
SHA13e1a26f783c86fd60f03c7f3f2df7b739f621bc5
SHA2564431aec1f1ab898589de8487b57de2598b4659ae671d02859c3900da509b0b26
SHA51233f8fcb9192c4f08a7814e2af68b566c4695deef58feb5237d4f9e1daa315910c119102db19ab02e99adc8a7cd29def4a6440cf55c68717c994c6d6ac832fe9a
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\jaccess.jar
Filesize42KB
MD5bdb0f2c26bc783803269facb7d43ec0f
SHA173afc0c4510fe6394e9359c4a6b495ed9f7d692d
SHA2564fde6b2f2c746db62ab5930b4abcecc966131535a83f2cc93067011d7071e6fd
SHA5124714127ffa2ef2b4a1789e70d7ade04056f3547d36016b82c7a49881367428a9c664e8f1b32817781c12fd4965dca9320dc9762ac829dbe90164ca1bd5f80ccd
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\jaccess.jar.p2
Filesize35KB
MD5171c05d2fefe375032a6babc7dd11515
SHA1dec20c83b6168dd5d3bb4935322e39e7c46ba3d8
SHA25629977238c33d12c08aef17139daed8d7ecf97b4f502c40a791062915705ebe52
SHA5129a84fb352224542453863c53f6dbf72829ea019b9d2a771420414daec27920a84e1ba3e6d3161d9b6b447b0ad6ff7088ca9bf1ba266be4757f113661efe03ce5
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\legacy8ujsse.jar
Filesize418KB
MD580558729bb2edfc3b03b8dee73d527b4
SHA1521d59e97a3e254ecd9dd06b213ac0fda4c2983a
SHA256f17139ecb92b94a2a3909a5a2f2c8a5feee9afaf25e8cd2b5a8ab0fd3dd73c9e
SHA51280e5785beb2de61ea8cc9882e94e3abf99917556467ebf935297a9e0f7376b313850cdb0ffea2d98ada9db8c6b3a6104572399667e8cfde0cd537775e445b0ad
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\legacy8ujsse.jar.p2
Filesize271KB
MD53b997068ed80236ba82703b7c8275621
SHA163d2bbca29231220d5beb285c9cf263b4c93acb9
SHA25640799e64da3944f75ddb8e9a378c7d37fe8c94183f173717b2f08dad865cf89d
SHA512c67ca18a538ea12e0032728e575f25b11da6b847ec3eccceb59c53d18eddbc4d711d4684e8f60ed0da6e7149ab31a9f8c04ef45f5c5792ceb749c3f7e5b7ddb4
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\openjsse.jar
Filesize1.3MB
MD5a2dd6baced76fe17ef8db6d6a6dca1ec
SHA126e46d9fb59464f895da1474ed0c545831311bd0
SHA25647545a341a3e7b99164150d000607e10b7b3a16caf3320090fc1e5c6128c13e1
SHA512a9472630786ca3369c3e1d9303b5430eb744c962d7287b95d75caaf00d15ef735c985e5093cc2d36dabfccaab2782210f71eec1be3cd1cc05886eaa969ddc947
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\openjsse.jar.p2
Filesize580KB
MD5558a800e89bc6c647e2909a0c91dd9f8
SHA18fcfec1b4e704661ff0c7599e0ee2ec60c69088c
SHA256ec51166a6f4796de2283de2a59e9143d953fe37bf9abbc71873a3978dbec85db
SHA51219e585b8d1c13ab511ee66615442fb2bce3bb529225b623271a8f27a58d76d541434ac02b619d55bbca03f1f9adae94745bc1f2504eadc7f00220b49ba6c13bf
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\sunmscapi.jar
Filesize42KB
MD5199a840d4c8163628bc069703282476f
SHA11cd2bea3fedc312a9b470871fe87c8f301f8ef32
SHA256fd7de375f7cf8bb4edef258b73ec78966394318df262d4cb2a22bcbeb127f8e4
SHA51201fda70b4d77c221dd63d2a4e9eab587c667e8af22e920a44b64eb6208c8e96d9044d96a407a05849c2357fc2a9aa3264495ac6559df6df1e2ddfadd088d5aef
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\sunmscapi.jar.p2
Filesize21KB
MD54ea26f1be03d62f5170c551398913c5c
SHA1b633de9990e519dd878b5eb20e4f4d0441f96aca
SHA2569bf43b7dd1e1aa0270e6c250674a8c0d651ab85463ab0337bf09f04e574b6183
SHA512e8a0604ff89f570b2291e2192e4e9853981c867f60d471829e7d286c1b9c51db9afc31b52ca5e0428a2bc1c44ff7d875e1fdb7d6efb413b92d979b6f49aedfb2
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\sunpkcs11.jar
Filesize263KB
MD5af127a77a8798a63de54967af500c655
SHA1b4b82b535dd619607288fdfb739d1d56d6cc6c68
SHA256911970a9929e5e8a16d17ecb2884f81d5f7963636d327846e58139cbfae04fa8
SHA512b2a94cae4f434130ba579e3131abee5866b444ad7b1e7b51c1bec037c56324ee51e4fcd9ac4b2cbb9ebf17f0df414809a6c718250968921e789e6f45025abd4b
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\ext\sunpkcs11.jar.p2
Filesize164KB
MD5593de57a7abd58e4f31ac663254f85e0
SHA10684301a3b0433b51eba019c20560090d79eda15
SHA2563490e4a3ce662daeccc19aee199e22833f60a5e0f3743ffc99a80ba9b7be169c
SHA5122389ccc97199d64ac81d61c0de67ea25dadec0bc60b741de1247e1b718e5559a7348eb7e52e98e9ed7e20970495409fd8b075dc9d7f3ec1fd0f8733fcbacc19b
-
Filesize
1.8MB
MD5f6f84176ef383688b6c8eba60336a57c
SHA1f2c7e6a66c7c34d4c0005c89a533454eecf9b007
SHA2563dab1640802f083348c4ab929bfe2e4c8fe7757236b4550a81679d93cf0ed114
SHA512aeaf0da0334882b80b28de29d5f2a0e40ba8ae8d1fcd67e67ab0a3ee8b2948d2e6df6c153ea860871d5cf2ec5b97484a6c3050b9446e6d2249c353dd488dd5b8
-
C:\Users\Admin\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1714792998-6-app\lib\jsse.jar.p2
Filesize365KB
MD5048afc64953480883554a6b3135de599
SHA1a7c088c61b0178661012f10802e2de4d3eaec762
SHA256e935fa86aed1296e44c9b59aeee8d75fd8670d6ce23c1ed418e9af8cc862e9e2
SHA512d6adba78de8fb253f350d1098c54d0824a01e212c6499d8a666a26ed450cea4a2f6413ac9f47717d7781f25d5ac4bac61e094ab1ba199d556ea8e789fdd48224
-
Filesize
15.7MB
MD5d538beef841a0bf0bd057e663fa74048
SHA13f1a1351b0e66357f7a2f9f9bc85c1a7606f2fa3
SHA256d97e1a6356e7531e94c1a4457d9e3f41141408a397d4b06f5618d34cb50b423b
SHA5123aefd51aea1c1274ac2cd5b9716d8b198b79fe39d5d4b218ed3a23d159a75c9c35f13a59f0d9bdbc41b3d72eab23454fc7478868df6831fcabf64727125508bb