Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/11/2024, 01:57

General

  • Target

    fe407790dad4c2b82a80548e5717a25994a35249209b94a2b13df894dca0a28a.exe

  • Size

    3.8MB

  • MD5

    fd4d06722033dcfbc3e7993bcf2f574c

  • SHA1

    3e0a7ab1bc781353deb0800408b0074b5589b018

  • SHA256

    fe407790dad4c2b82a80548e5717a25994a35249209b94a2b13df894dca0a28a

  • SHA512

    2c9434b08c0146e630c71cbe9fd82d25997441565e6b3bce7057c06a6b3befa646c4d79af514d89445619503c82f40c2cb462e0666d06ace7d94322a2ea9950b

  • SSDEEP

    98304:xaROAR3Zsbt5be4s7JviZUnk4BhvbzkzmOJdrX6OL:xIiS4gHnk4z3krRL

Malware Config

Extracted

Family

lumma

C2

https://preside-comforter.sbs

https://savvy-steereo.sbs

https://copper-replace.sbs

https://record-envyp.sbs

https://slam-whipp.sbs

https://wrench-creter.sbs

https://looky-marked.sbs

https://plastic-mitten.sbs

https://hallowed-noisy.sbs

Signatures

  • D3fackloader

    D3fackloader is a loader and downloader using Inno Setup.

  • D3fackloader family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 22 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe407790dad4c2b82a80548e5717a25994a35249209b94a2b13df894dca0a28a.exe
    "C:\Users\Admin\AppData\Local\Temp\fe407790dad4c2b82a80548e5717a25994a35249209b94a2b13df894dca0a28a.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Users\Admin\AppData\Local\Temp\is-JML8D.tmp\fe407790dad4c2b82a80548e5717a25994a35249209b94a2b13df894dca0a28a.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-JML8D.tmp\fe407790dad4c2b82a80548e5717a25994a35249209b94a2b13df894dca0a28a.tmp" /SL5="$7004A,275511,275456,C:\Users\Admin\AppData\Local\Temp\fe407790dad4c2b82a80548e5717a25994a35249209b94a2b13df894dca0a28a.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3572
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" cmd /c interim.cmd
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4092
        • C:\Windows\SysWOW64\attrib.exe
          attrib +s +h /D "C:\Users\Admin\AppData\Local\Temp\msdtadmin\*.*"
          4⤵
          • Sets file to hidden
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:3972
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c tar xf interim
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1892
          • C:\Windows\SysWOW64\tar.exe
            tar xf interim
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1920
        • C:\Windows\SysWOW64\attrib.exe
          attrib +s +h /D "C:\Users\Admin\AppData\Local\Temp\msdtadmin\*.*"
          4⤵
          • Sets file to hidden
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1540
        • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\241.exe
          ".\241\241.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3456
          • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\bin\javaw.exe
            "C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath "lib\.;lib\..;lib\activation.jar;lib\asm-all.jar;lib\commons-email.jar;lib\dn-compiled-module.jar;lib\dn-php-sdk.jar;lib\gson.jar;lib\jfoenix.jar;lib\jkeymaster.jar;lib\jna.jar;lib\jphp-app-framework.jar;lib\jphp-core.jar;lib\jphp-desktop-ext.jar;lib\jphp-desktop-hotkey-ext.jar;lib\jphp-gui-ext.jar;lib\jphp-gui-jfoenix-ext.jar;lib\jphp-json-ext.jar;lib\jphp-jsoup-ext.jar;lib\jphp-mail-ext.jar;lib\jphp-runtime.jar;lib\jphp-systemtray-ext.jar;lib\jphp-xml-ext.jar;lib\jphp-zend-ext.jar;lib\jphp-zip-ext.jar;lib\jsoup.jar;lib\mail.jar;lib\slf4j-api.jar;lib\slf4j-simple.jar;lib\zt-zip.jar" org.develnext.jphp.ext.javafx.FXLauncher
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3140
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
              Powershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command "Add-MpPreference -Force -ExclusionPath "C:\""' -Verb RunAs}"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4108
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -Force -ExclusionPath C:"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3884
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
              Powershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command "Set-MpPreference -Force -DisableBehaviorMonitoring "' -Verb RunAs}"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2308
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-MpPreference -Force -DisableBehaviorMonitoring
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2844
            • C:\Windows\SysWOW64\explorer.exe
              explorer C:\Users\Admin\AppData\Local\Temp\NWMzZGE1YTRmZDE3Nzc4OGVjZmRlN2I1Nzk0YWE1NWQ.exe
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3948
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Users\Admin\AppData\Local\Temp\NWMzZGE1YTRmZDE3Nzc4OGVjZmRlN2I1Nzk0YWE1NWQ.exe
      "C:\Users\Admin\AppData\Local\Temp\NWMzZGE1YTRmZDE3Nzc4OGVjZmRlN2I1Nzk0YWE1NWQ.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:860
      • C:\Users\Admin\AppData\Local\Temp\NWMzZGE1YTRmZDE3Nzc4OGVjZmRlN2I1Nzk0YWE1NWQ.exe
        "C:\Users\Admin\AppData\Local\Temp\NWMzZGE1YTRmZDE3Nzc4OGVjZmRlN2I1Nzk0YWE1NWQ.exe"
        3⤵
        • Executes dropped EXE
        PID:508
      • C:\Users\Admin\AppData\Local\Temp\NWMzZGE1YTRmZDE3Nzc4OGVjZmRlN2I1Nzk0YWE1NWQ.exe
        "C:\Users\Admin\AppData\Local\Temp\NWMzZGE1YTRmZDE3Nzc4OGVjZmRlN2I1Nzk0YWE1NWQ.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3968
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 1384
          4⤵
          • Program crash
          PID:1416
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 1396
          4⤵
          • Program crash
          PID:4804
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3968 -ip 3968
    1⤵
      PID:916
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 3968 -ip 3968
      1⤵
        PID:3940

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hlla2nai.jbg.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\is-0GAS4.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • C:\Users\Admin\AppData\Local\Temp\is-0GAS4.tmp\idp.dll

        Filesize

        232KB

        MD5

        55c310c0319260d798757557ab3bf636

        SHA1

        0892eb7ed31d8bb20a56c6835990749011a2d8de

        SHA256

        54e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed

        SHA512

        e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57

      • C:\Users\Admin\AppData\Local\Temp\is-JML8D.tmp\fe407790dad4c2b82a80548e5717a25994a35249209b94a2b13df894dca0a28a.tmp

        Filesize

        4.6MB

        MD5

        510ba2af18d9c64ce945ab97d4be68e7

        SHA1

        34775cf6381763d9e302493a458a62b4763974a8

        SHA256

        743a0cc6f1bb3baafe1cda6384ae28f0c9a2f7cfe8acfd52c41174712b3d4e8a

        SHA512

        607cfab850301d6ea17c461db8daeb8895e69c7b85706c1a009b66950723a7be1492793ba83d40bffa8bfd1cd903fb93cf8435a20d64ea11f8e7e534d98986d9

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\241.exe

        Filesize

        32KB

        MD5

        00619cc7eb9108c9285a23ef9242b2ef

        SHA1

        dafbf6f4ee0d117a8418809e94f7c505109147bd

        SHA256

        b3ee7af6bcedbdc54828b21ce2a9ca2e6d01a6c4bc7b28b530af651e9fe8d153

        SHA512

        c2923c71268680ced2ffb4698cc40cd23eb4cf3eed03661ac25578e7154b6d08ea3c2ba5b98ab62e059e92c5a5214869a5b8ba981000241eb9f9f255c70b8ac0

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\bin\client\jvm.dll

        Filesize

        3.7MB

        MD5

        39c302fe0781e5af6d007e55f509606a

        SHA1

        23690a52e8c6578de6a7980bb78aae69d0f31780

        SHA256

        b1fbdbb1e4c692b34d3b9f28f8188fc6105b05d311c266d59aa5e5ec531966bc

        SHA512

        67f91a75e16c02ca245233b820df985bd8290a2a50480dff4b2fd2695e3cf0b4534eb1bf0d357d0b14f15ce8bd13c82d2748b5edd9cc38dc9e713f5dc383ed77

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\bin\java.dll

        Filesize

        123KB

        MD5

        73bd0b62b158c5a8d0ce92064600620d

        SHA1

        63c74250c17f75fe6356b649c484ad5936c3e871

        SHA256

        e7b870deb08bc864fa7fd4dec67cef15896fe802fafb3009e1b7724625d7da30

        SHA512

        eba1cf977365446b35740471882c5209773a313de653404a8d603245417d32a4e9f23e3b6cd85721143d2f9a0e46ed330c3d8ba8c24aee390d137f9b5cd68d8f

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\bin\javaw.exe

        Filesize

        187KB

        MD5

        48c96771106dbdd5d42bba3772e4b414

        SHA1

        e84749b99eb491e40a62ed2e92e4d7a790d09273

        SHA256

        a96d26428942065411b1b32811afd4c5557c21f1d9430f3696aa2ba4c4ac5f22

        SHA512

        9f891c787eb8ceed30a4e16d8e54208fa9b19f72eeec55b9f12d30dc8b63e5a798a16b1ccc8cea3e986191822c4d37aedb556e534d2eb24e4a02259555d56a2c

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\bin\msvcr100.dll

        Filesize

        755KB

        MD5

        bf38660a9125935658cfa3e53fdc7d65

        SHA1

        0b51fb415ec89848f339f8989d323bea722bfd70

        SHA256

        60c06e0fa4449314da3a0a87c1a9d9577df99226f943637e06f61188e5862efa

        SHA512

        25f521ffe25a950d0f1a4de63b04cb62e2a3b0e72e7405799586913208bf8f8fa52aa34e96a9cc6ee47afcd41870f3aa0cd8289c53461d1b6e792d19b750c9a1

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\bin\net.dll

        Filesize

        78KB

        MD5

        691b937a898271ee2cffab20518b310b

        SHA1

        abedfcd32c3022326bc593ab392dea433fcf667c

        SHA256

        2f5f1199d277850a009458edb5202688c26dd993f68fe86ca1b946dc74a36d61

        SHA512

        1c09f4e35a75b336170f64b5c7254a51461dc1997b5862b62208063c6cf84a7cb2d66a67e947cbbf27e1cf34ccd68ba4e91c71c236104070ef3beb85570213ec

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\bin\nio.dll

        Filesize

        50KB

        MD5

        95edb3cb2e2333c146a4dd489ce67cbd

        SHA1

        79013586a6e65e2e1f80e5caf9e2aa15b7363f9a

        SHA256

        96cf590bddfd90086476e012d9f48a9a696efc054852ef626b43d6d62e72af31

        SHA512

        ab671f1bce915d748ee49518cc2a666a2715b329cab4ab8f6b9a975c99c146bb095f7a4284cd2aaf4a5b4fcf4f939f54853af3b3acc4205f89ed2ba8a33bb553

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\bin\verify.dll

        Filesize

        38KB

        MD5

        de2167a880207bbf7464bcd1f8bc8657

        SHA1

        0ff7a5ea29c0364a1162a090dffc13d29bc3d3c7

        SHA256

        fd856ea783ad60215ce2f920fcb6bb4e416562d3c037c06d047f1ec103cd10b3

        SHA512

        bb83377c5cff6117cec6fbadf6d40989ce1ee3f37e4ceba17562a59ea903d8962091146e2aa5cc44cfdddf280da7928001eea98abf0c0942d69819b2433f1322

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\bin\zip.dll

        Filesize

        68KB

        MD5

        cb99b83bbc19cd0e1c2ec6031d0a80bc

        SHA1

        927e1e24fd19f9ca8b5191ef3cc746b74ab68bcd

        SHA256

        68148243e3a03a3a1aaf4637f054993cb174c04f6bd77894fe84d74af5833bec

        SHA512

        29c4978fa56f15025355ce26a52bdf8197b8d8073a441425df3dfc93c7d80d36755cc05b6485dd2e1f168df2941315f883960b81368e742c4ea8e69dd82fa2ba

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\lib\currency.data

        Filesize

        4KB

        MD5

        f6258230b51220609a60aa6ba70d68f3

        SHA1

        b5b95dd1ddcd3a433db14976e3b7f92664043536

        SHA256

        22458853da2415f7775652a7f57bb6665f83a9ae9fb8bd3cf05e29aac24c8441

        SHA512

        b2dfcfdebf9596f2bb05f021a24335f1eb2a094dca02b2d7dd1b7c871d5eecda7d50da7943b9f85edb5e92d9be6b6adfd24673ce816df3960e4d68c7f894563f

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\lib\ext\jfxrt.jar

        Filesize

        17.3MB

        MD5

        042b3675517d6a637b95014523b1fd7d

        SHA1

        82161caf5f0a4112686e4889a9e207c7ba62a880

        SHA256

        a570f20f8410f9b1b7e093957bf0ae53cae4731afaea624339aa2a897a635f22

        SHA512

        7672d0b50a92e854d3bd3724d01084cc10a90678b768e9a627baf761993e56a0c6c62c19155649fe9a8ceeabf845d86cbbb606554872ae789018a8b66e5a2b35

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\lib\ext\meta-index

        Filesize

        1KB

        MD5

        77abe2551c7a5931b70f78962ac5a3c7

        SHA1

        a8bb53a505d7002def70c7a8788b9a2ea8a1d7bc

        SHA256

        c557f0c9053301703798e01dc0f65e290b0ae69075fb49fcc0e68c14b21d87f4

        SHA512

        9fe671380335804d4416e26c1e00cded200687db484f770ebbdb8631a9c769f0a449c661cb38f49c41463e822beb5248e69fd63562c3d8c508154c5d64421935

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\lib\i386\jvm.cfg

        Filesize

        657B

        MD5

        9fd47c1a487b79a12e90e7506469477b

        SHA1

        7814df0ff2ea1827c75dcd73844ca7f025998cc6

        SHA256

        a73aea3074360cf62adedc0c82bc9c0c36c6a777c70da6c544d0fba7b2d8529e

        SHA512

        97b9d4c68ac4b534f86efa9af947763ee61aee6086581d96cbf7b3dbd6fd5d9db4b4d16772dce6f347b44085cef8a6ea3bfd3b84fbd9d4ef763cef39255fbce3

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\lib\jsse.jar

        Filesize

        619KB

        MD5

        fd1434c81219c385f30b07e33cef9f30

        SHA1

        0b5ee897864c8605ef69f66dfe1e15729cfcbc59

        SHA256

        bc3a736e08e68ace28c68b0621dccfb76c1063bd28d7bd8fce7b20e7b7526cc5

        SHA512

        9a778a3843744f1fabad960aa22880d37c30b1cab29e123170d853c9469dc54a81e81a9070e1de1bf63ba527c332bb2b1f1d872907f3bdce33a6898a02fef22d

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\lib\meta-index

        Filesize

        2KB

        MD5

        91aa6ea7320140f30379f758d626e59d

        SHA1

        3be2febe28723b1033ccdaa110eaf59bbd6d1f96

        SHA256

        4af21954cdf398d1eae795b6886ca2581dac9f2f1d41c98c6ed9b5dbc3e3c1d4

        SHA512

        03428803f1d644d89eb4c0dcbdea93acaac366d35fc1356ccabf83473f4fef7924edb771e44c721103cec22d94a179f092d1bfd1c0a62130f076eb82a826d7cb

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\lib\security\java.security

        Filesize

        26KB

        MD5

        409c132fe4ea4abe9e5eb5a48a385b61

        SHA1

        446d68298be43eb657934552d656fa9ae240f2a2

        SHA256

        4d9e5a12b8cac8b36ecd88468b1c4018bc83c97eb467141901f90358d146a583

        SHA512

        7fed286ac9aed03e2dae24c3864edbbf812b65965c7173cc56ce622179eb5f872f77116275e96e1d52d1c58d3cdebe4e82b540b968e95d5da656aa74ad17400d

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\activation.jar

        Filesize

        67KB

        MD5

        46a37512971d8eca81c3fcf245bf07d2

        SHA1

        485de3a253e23f645037828c07f1d7f1af40763a

        SHA256

        ae475120e9fcd99b4b00b38329bd61cdc5eb754eee03fe66c01f50e137724f99

        SHA512

        49119b0cc3af02700685a55c6f15e6d40643f81640e642b9ea39a59e18d542f8837d30b43b5be006ce1a98c8ec9729bb2165c0442978168f64caa2fc6e3cb93d

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\asm-all.jar

        Filesize

        241KB

        MD5

        f5ad16c7f0338b541978b0430d51dc83

        SHA1

        2ea49e08b876bbd33e0a7ce75c8f371d29e1f10a

        SHA256

        7fbffbc1db3422e2101689fd88df8384b15817b52b9b2b267b9f6d2511dc198d

        SHA512

        82e6749f4a6956f5b8dd5a5596ca170a1b7ff4e551714b56a293e6b8c7b092cbec2bec9dc0d9503404deb8f175cbb1ded2e856c6bc829411c8ed311c1861336a

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\commons-email.jar

        Filesize

        48KB

        MD5

        f045afea3cb27ead50b0c59fc3f0dffd

        SHA1

        c1a7133db9008fa1eae082e6158c3f4c128ec27e

        SHA256

        268253139a8936afa68909df8ced52a9d769665ee9373a60e19a93f254fd54b5

        SHA512

        0e2d2cbef9d4c19310748e37ad909e57aa37490a7dfd41557b1914857fe7235e434a6fdee00f663688941da3e70fe882b5c63df10ba8c7ad18936959f906722b

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\dn-compiled-module.jar

        Filesize

        1.0MB

        MD5

        92729552284021914f65d903ad034ce6

        SHA1

        f2c2e6bc73e31bbb91f760f8e64dc90f6585777d

        SHA256

        502659bdc8e87682ef93ecba4ce743a6dfbe9fb5c43628c94200d4a01c4b1c05

        SHA512

        fe8741ed1ce40bb4490af6529512c9c4c704266a48b7853f816362adbddcc9a09f756599856195da44af93b3961faff832db156fb6d41858c1a5e0089636d83b

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\dn-php-sdk.jar

        Filesize

        12KB

        MD5

        3e5e8cccff7ff343cbfe22588e569256

        SHA1

        66756daa182672bff27e453eed585325d8cc2a7a

        SHA256

        0f26584763ef1c5ec07d1f310f0b6504bc17732f04e37f4eb101338803be0dc4

        SHA512

        8ea5f31e25c3c48ee21c51abe9146ee2a270d603788ec47176c16acac15dad608eef4fa8ca0f34a1bbc6475c29e348bd62b0328e73d2e1071aaa745818867522

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\gson.jar

        Filesize

        226KB

        MD5

        5134a2350f58890ffb9db0b40047195d

        SHA1

        751f548c85fa49f330cecbb1875893f971b33c4e

        SHA256

        2d43eb5ea9e133d2ee2405cc14f5ee08951b8361302fdd93494a3a997b508d32

        SHA512

        c3cdaf66a99e6336abc80ff23374f6b62ac95ab2ae874c9075805e91d849b18e3f620cc202b4978fc92b73d98de96089c8714b1dd096b2ae1958cfa085715f7a

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\jfoenix.jar

        Filesize

        2.3MB

        MD5

        6316f84bc78d40b138dab1adc978ca5d

        SHA1

        b12ea05331ad89a9b09937367ebc20421f17b9ff

        SHA256

        d637e3326f87a173abd5f51ac98906a3237b9e511d07d31d6aafcf43f33dac17

        SHA512

        1cdca01ed9c2bc607207c8c51f4b532f4153e94b3846308332eccae25f9c5fddf8279e3063f44a75dd43d696eab0f9f340f9bf2f3ec805ab0f2f1de5135a426c

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\jkeymaster.jar

        Filesize

        51KB

        MD5

        21a017201cbb16ae0546069d4371f1c2

        SHA1

        9f1e8c9341a8a0c51299b961c4f6c7661c822756

        SHA256

        a2d68aaf08f15ff1c3b9b224641e8b4c35ee30b10f655d6420571b0429f19c87

        SHA512

        6c65740c17de72ba7b0df95aa29d095a1502f298924c63f364328f6fbb38920e92e0246d28a642f7c9fe3ab582341e607b0ae01515d470b4595d698ce81363d6

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\jna.jar

        Filesize

        1.1MB

        MD5

        8d536ddbe44d1500d262960891911f91

        SHA1

        fcc5b10cb812c41b00708e7b57baccc3aee5567c

        SHA256

        edc2a2c4f9b0b55fdc66aef3c9a9ddfff97e4b892842d4c0e1bc6eaff704abcb

        SHA512

        0ff97f158d1b1fbbef35813a1be2cc9f0c2321fa66e47af3276d3cb93178e668a652bac8a1aee82986dbf86e6db34518045eddfdd10ca827f3e4762faaa814f3

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\jphp-app-framework.jar

        Filesize

        103KB

        MD5

        0c8768cdeb3e894798f80465e0219c05

        SHA1

        c4da07ac93e4e547748ecc26b633d3db5b81ce47

        SHA256

        15f36830124fc7389e312cf228b952024a8ce8601bf5c4df806bc395d47db669

        SHA512

        35db507a3918093b529547e991ab6c1643a96258fc95ba1ea7665ff762b0b8abb1ef732b3854663a947effe505be667bd2609ffcccb6409a66df605f971da106

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\jphp-core.jar

        Filesize

        464KB

        MD5

        7e5e3d6d352025bd7f093c2d7f9b21ab

        SHA1

        ad9bfc2c3d70c574d34a752c5d0ebcc43a046c57

        SHA256

        5b37e8ff2850a4cbb02f9f02391e9f07285b4e0667f7e4b2d4515b78e699735a

        SHA512

        c19c29f8ad8b6beb3eed40ab7dc343468a4ca75d49f1d0d4ea0b4a5cee33f745893fba764d35c8bd157f7842268e0716b1eb4b8b26dcf888fb3b3f4314844aad

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\jphp-desktop-ext.jar

        Filesize

        16KB

        MD5

        b50e2c75f5f0e1094e997de8a2a2d0ca

        SHA1

        d789eb689c091536ea6a01764bada387841264cb

        SHA256

        cf4068ebb5ecd47adec92afba943aea4eb2fee40871330d064b69770cccb9e23

        SHA512

        57d8ac613805edada6aeba7b55417fd7d41c93913c56c4c2c1a8e8a28bbb7a05aade6e02b70a798a078dc3c747967da242c6922b342209874f3caf7312670cb0

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\jphp-desktop-hotkey-ext.jar

        Filesize

        5KB

        MD5

        22acc05e1efc1d4c5faa0359ce725d47

        SHA1

        458e7f911d024a3d786e76f256b017b0901f48f8

        SHA256

        c55c267d954ec9f24226780ee49fa7e1bc2baec3af6bfc0caa6cc1b49d8ca90c

        SHA512

        b11754f5337a73d317ae311fd4c20c0b548e1163107b741cc9e6d4d9027a8f99551e3184a83f9ad20098092e87ef1741c1e437058b7cac92727124589c303ef5

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\jphp-gui-ext.jar

        Filesize

        688KB

        MD5

        6696368a09c7f8fed4ea92c4e5238cee

        SHA1

        f89c282e557d1207afd7158b82721c3d425736a7

        SHA256

        c25d7a7b8f0715729bccb817e345f0fdd668dd4799c8dab1a4db3d6a37e7e3e4

        SHA512

        0ab24f07f956e3cdcd9d09c3aa4677ff60b70d7a48e7179a02e4ff9c0d2c7a1fc51624c3c8a5d892644e9f36f84f7aaf4aa6d2c9e1c291c88b3cff7568d54f76

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\jphp-gui-jfoenix-ext.jar

        Filesize

        50KB

        MD5

        d093f94c050d5900795de8149cb84817

        SHA1

        54058dda5c9e66a22074590072c8a48559bba1fb

        SHA256

        4bec0794a0d69debe2f955bf495ea7c0858ad84cb0d2d549cacb82e70c060cba

        SHA512

        3faaa415fba5745298981014d0042e8e01850fccaac22f92469765fd8c56b920da877ff3138a629242d9c52e270e7e2ce89e7c69f6902859f48ea0359842e2fb

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\jphp-json-ext.jar

        Filesize

        16KB

        MD5

        fde38932b12fc063451af6613d4470cc

        SHA1

        bc08c114681a3afc05fb8c0470776c3eae2eefeb

        SHA256

        9967ea3c3d1aee8db5a723f714fba38d2fc26d8553435ab0e1d4e123cd211830

        SHA512

        0f211f81101ced5fff466f2aab0e6c807bb18b23bc4928fe664c60653c99fa81b34edf5835fcc3affb34b0df1fa61c73a621df41355e4d82131f94fcc0b0e839

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\jphp-jsoup-ext.jar

        Filesize

        19KB

        MD5

        d963210c02cd1825e967086827da8294

        SHA1

        26c4d004b5ffdb8f81de2d6b158a3f34819faf01

        SHA256

        7908145cf17301bedefd6e3af8c93e0320582c0562919ffb56cc21b7fd532b96

        SHA512

        756c21dc1a02d579f0e2ed39e5bedca5491087cdc28e3e96c8663a493bcfeeeeea44dc40681ec6341426dfa995883dbce11b76d1f921e043ae220399a9e554fb

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\jphp-mail-ext.jar

        Filesize

        9KB

        MD5

        405861c5544a92fb345ebca30dcaec2d

        SHA1

        f8fe5dcb597fff1bf6489f1283a0157be1a313c3

        SHA256

        fb206af4ddcc568eb1f7b38b7266be683167c95befef797b0965b4533647b17d

        SHA512

        f1330e5b39a2af8cf378172d9311a50b65aaa7d0c793b354efbcaa3c843bddeffb756a50f1cb9adaf974c3bb3fa6b5ef4b779e1efeeeb1b3946605f47053fe03

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\jphp-runtime.jar

        Filesize

        1.1MB

        MD5

        d5ef47c915bef65a63d364f5cf7cd467

        SHA1

        f711f3846e144dddbfb31597c0c165ba8adf8d6b

        SHA256

        9c287472408857301594f8f7bda108457f6fdae6e25c87ec88dbf3012e5a98b6

        SHA512

        04aeb956bfcd3bd23b540f9ad2d4110bb2ffd25fe899152c4b2e782daa23a676df9507078ecf1bfc409ddfbe2858ab4c4c324f431e45d8234e13905eb192bae8

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\jphp-systemtray-ext.jar

        Filesize

        18KB

        MD5

        acc229916e4c7c666b45072b525041e7

        SHA1

        36f508f20347fce608130806a26cd796daf5dd20

        SHA256

        91ed39e83199784b0fb359a9e2b319572b2ba1b1f4492e82a590bf488650f7f4

        SHA512

        c537c442874c63103f5ae934b6fdd03834e62b7374070efcbcd05b606d02274679078c38437cb1de79e3284f39fc2981c79274d93b0ba4afeb7c6942cca54235

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\jphp-xml-ext.jar

        Filesize

        19KB

        MD5

        0a79304556a1289aa9e6213f574f3b08

        SHA1

        7ee3bde3b1777bf65d4f62ce33295556223a26cd

        SHA256

        434e57fffc7df0b725c1d95cabafdcdb83858ccb3e5e728a74d3cf33a0ca9c79

        SHA512

        1560703d0c162d73c99cef9e8ddc050362e45209cc8dea6a34a49e2b6f99aae462eae27ba026bdb29433952b6696896bb96998a0f6ac0a3c1dbbb2f6ebc26a7e

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\jphp-zend-ext.jar

        Filesize

        95KB

        MD5

        4bc2aea7281e27bc91566377d0ed1897

        SHA1

        d02d897e8a8aca58e3635c009a16d595a5649d44

        SHA256

        4aef566bbf3f0b56769a0c45275ebbf7894e9ddb54430c9db2874124b7cea288

        SHA512

        da35bb2f67bca7527dc94e5a99a162180b2701ddca2c688d9e0be69876aca7c48f192d0f03d431ccd2d8eec55e0e681322b4f15eba4db29ef5557316e8e51e10

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\jphp-zip-ext.jar

        Filesize

        12KB

        MD5

        20f6f88989e806d23c29686b090f6190

        SHA1

        1fdb9a66bb5ca587c05d3159829a8780bb66c87d

        SHA256

        9d5f06d539b91e98fd277fc01fd2f9af6fea58654e3b91098503b235a83abb16

        SHA512

        2798bb1dd0aa121cd766bd5b47d256b1a528e9db83ed61311fa685f669b7f60898118ae8c69d2a30d746af362b810b133103cbe426e0293dd2111aca1b41ccea

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\jsoup.jar

        Filesize

        342KB

        MD5

        36145fee38e79b81035787f1be296a52

        SHA1

        33ee82e324f4b1e40167f3dc5e01234a1c5cab61

        SHA256

        6ebe6abd7775c10a49407ae22db45c840cd2cdaf715866a5b0b5af70941c3f4a

        SHA512

        3b00b07320831f075a6af9ac1863b8756fe4f99a1b4f2e53578dca17fdaf7bdb147279225045e9eeeba4898fe321cf5457832b8e6a1a5b71acff9a1c10392659

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\mail.jar

        Filesize

        496KB

        MD5

        ec6e4e5ebd85a221b395b8f3b37545e6

        SHA1

        85319c87280f30e1afc54c355f91f44741beac49

        SHA256

        17bddec86cfe01092bd358c249b7c2ce4295c13cdad314d8eacc8426fdbe3034

        SHA512

        3e3e406542676f27b5008a061ceaa90580e2f9fd78b31576c99f7612033f2dd0a14824e7bfb16e6f1a12ad96985319fd6f1c2706230019c76ce22da8c7dfd181

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\slf4j-api.jar

        Filesize

        40KB

        MD5

        caafe376afb7086dcbee79f780394ca3

        SHA1

        da76ca59f6a57ee3102f8f9bd9cee742973efa8a

        SHA256

        18c4a0095d5c1da6b817592e767bb23d29dd2f560ad74df75ff3961dbde25b79

        SHA512

        5dd6271fd5b34579d8e66271bab75c89baca8b2ebeaa9966de391284bd08f2d720083c6e0e1edda106ecf8a04e9a32116de6873f0f88c19c049c0fe27e5d820b

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\slf4j-simple.jar

        Filesize

        14KB

        MD5

        722bb90689aecc523e3fe317e1f0984b

        SHA1

        8dacf9514f0c707cbbcdd6fd699e8940d42fb54e

        SHA256

        0966e86fffa5be52d3d9e7b89dd674d98a03eed0a454fbaf7c1bd9493bd9d874

        SHA512

        d5effbfa105bcd615e56ef983075c9ef0f52bcfdbefa3ce8cea9550f25b859e48b32f2ec9aa7a305c6611a3be5e0cde0d269588d9c2897ca987359b77213331d

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\lib\zt-zip.jar

        Filesize

        102KB

        MD5

        0fd8bc4f0f2e37feb1efc474d037af55

        SHA1

        add8fface4c1936787eb4bffe4ea944a13467d53

        SHA256

        1e31ef3145d1e30b31107b7afc4a61011ebca99550dce65f945c2ea4ccac714b

        SHA512

        29de5832db5b43fdc99bb7ea32a7359441d6cf5c05561dd0a6960b33078471e4740ee08ffbd97a5ced4b7dd9cc98fad6add43edb4418bf719f90f83c58188149

      • C:\Users\Admin\AppData\Local\Temp\msdtadmin\interim.cmd

        Filesize

        212B

        MD5

        7ce5de8779412b7fdd4a53bf0f43f01c

        SHA1

        21d29b7d931d786cea6befb40f45838c2214d99b

        SHA256

        e28c87adc74786bca5100981bc241205a1f25f90bfe126ef9863e33f150e5ee3

        SHA512

        3b25acc2bb3ad123c87b2a077e62616acafb9c33beecde4e64076b55e8783580045967f218aaa41d054a0d7bc3b845d1820d16c9b2a2bc9dc108ff48c58e239b

      • memory/1252-334-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB

      • memory/1252-2-0x0000000000401000-0x0000000000417000-memory.dmp

        Filesize

        88KB

      • memory/1252-45-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB

      • memory/1252-0-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB

      • memory/2308-480-0x0000000005FE0000-0x000000000602C000-memory.dmp

        Filesize

        304KB

      • memory/2308-456-0x0000000005180000-0x00000000057A8000-memory.dmp

        Filesize

        6.2MB

      • memory/2308-478-0x0000000005A00000-0x0000000005D54000-memory.dmp

        Filesize

        3.3MB

      • memory/2308-459-0x0000000005890000-0x00000000058F6000-memory.dmp

        Filesize

        408KB

      • memory/2308-458-0x00000000057B0000-0x0000000005816000-memory.dmp

        Filesize

        408KB

      • memory/2308-455-0x00000000049D0000-0x0000000004A06000-memory.dmp

        Filesize

        216KB

      • memory/2844-536-0x0000000007640000-0x000000000765A000-memory.dmp

        Filesize

        104KB

      • memory/2844-535-0x0000000007560000-0x0000000007574000-memory.dmp

        Filesize

        80KB

      • memory/2844-522-0x000000006E660000-0x000000006E6AC000-memory.dmp

        Filesize

        304KB

      • memory/3140-572-0x00000000009A0000-0x00000000009A1000-memory.dmp

        Filesize

        4KB

      • memory/3140-484-0x00000000009A0000-0x00000000009A1000-memory.dmp

        Filesize

        4KB

      • memory/3140-427-0x00000000009A0000-0x00000000009A1000-memory.dmp

        Filesize

        4KB

      • memory/3140-375-0x00000000009A0000-0x00000000009A1000-memory.dmp

        Filesize

        4KB

      • memory/3140-555-0x00000000009A0000-0x00000000009A1000-memory.dmp

        Filesize

        4KB

      • memory/3140-573-0x00000000009A0000-0x00000000009A1000-memory.dmp

        Filesize

        4KB

      • memory/3140-372-0x00000000009A0000-0x00000000009A1000-memory.dmp

        Filesize

        4KB

      • memory/3140-557-0x00000000009A0000-0x00000000009A1000-memory.dmp

        Filesize

        4KB

      • memory/3140-448-0x00000000009A0000-0x00000000009A1000-memory.dmp

        Filesize

        4KB

      • memory/3140-564-0x00000000009A0000-0x00000000009A1000-memory.dmp

        Filesize

        4KB

      • memory/3456-304-0x0000000000400000-0x0000000000415000-memory.dmp

        Filesize

        84KB

      • memory/3572-20-0x00000000037A0000-0x00000000037DC000-memory.dmp

        Filesize

        240KB

      • memory/3572-331-0x0000000000400000-0x000000000089C000-memory.dmp

        Filesize

        4.6MB

      • memory/3572-7-0x0000000000400000-0x000000000089C000-memory.dmp

        Filesize

        4.6MB

      • memory/3572-46-0x0000000000400000-0x000000000089C000-memory.dmp

        Filesize

        4.6MB

      • memory/3884-521-0x0000000008270000-0x00000000088EA000-memory.dmp

        Filesize

        6.5MB

      • memory/3884-520-0x0000000007B10000-0x0000000007BB3000-memory.dmp

        Filesize

        652KB

      • memory/3884-519-0x0000000007AE0000-0x0000000007AFE000-memory.dmp

        Filesize

        120KB

      • memory/3884-532-0x0000000007CB0000-0x0000000007CBA000-memory.dmp

        Filesize

        40KB

      • memory/3884-533-0x0000000007E40000-0x0000000007E51000-memory.dmp

        Filesize

        68KB

      • memory/3884-534-0x0000000007E80000-0x0000000007E8E000-memory.dmp

        Filesize

        56KB

      • memory/3884-508-0x0000000007AA0000-0x0000000007AD2000-memory.dmp

        Filesize

        200KB

      • memory/3884-509-0x000000006E660000-0x000000006E6AC000-memory.dmp

        Filesize

        304KB

      • memory/3884-537-0x0000000007F60000-0x0000000007F68000-memory.dmp

        Filesize

        32KB

      • memory/3884-494-0x0000000006260000-0x00000000065B4000-memory.dmp

        Filesize

        3.3MB

      • memory/3968-565-0x0000000000400000-0x0000000000459000-memory.dmp

        Filesize

        356KB

      • memory/3968-566-0x0000000000400000-0x0000000000459000-memory.dmp

        Filesize

        356KB

      • memory/4108-457-0x0000000005530000-0x0000000005552000-memory.dmp

        Filesize

        136KB

      • memory/4108-485-0x0000000007B70000-0x0000000008114000-memory.dmp

        Filesize

        5.6MB

      • memory/4108-482-0x00000000069C0000-0x00000000069DA000-memory.dmp

        Filesize

        104KB

      • memory/4108-483-0x0000000006A40000-0x0000000006A62000-memory.dmp

        Filesize

        136KB

      • memory/4108-481-0x0000000007520000-0x00000000075B6000-memory.dmp

        Filesize

        600KB

      • memory/4108-479-0x00000000064E0000-0x00000000064FE000-memory.dmp

        Filesize

        120KB