General Info

File name

iCapture.jnlp

Full analysis
https://app.any.run/tasks/1fe5e64c-a061-4229-85ed-f00ea6e13659
Verdict
Malicious activity
Analysis date
11/8/2018, 13:51:54
OS:
Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:

MIME:
text/xml
File info:
XML 1.0 document, ASCII text, with CRLF line terminators
MD5

374c3c4f82e4b9dacdd47ddbeb3f75cc

SHA1

9630d19478a97135e7fd926995837ce75f2aa73d

SHA256

d5e48bec5f07fc3fb83b5ed2d1cc8f0c13ae233980250fe99f0ea8817b7e6b3c

SSDEEP

24:2daMgR4BIpU2p4Fa8jGPAZkLgYUzY4HBEQsR4BoVEsR4BoZom9zvn:caYB4uPBEQDBoyDBoZomJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distored by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.

Software environment set and analysis options

Launch configuration

Task duration
60 seconds
Additional time used
none
Fakenet option
off
Heavy Evaision option
off
MITM proxy
off
Route via Tor
off
Network geolocation
off
Privacy
Public submission
Autoconfirmation of UAC
on

Software preset

  • Internet Explorer 8.0.7601.17514
  • Adobe Acrobat Reader DC MUI (15.023.20070)
  • Adobe Flash Player 26 ActiveX (26.0.0.131)
  • Adobe Flash Player 26 NPAPI (26.0.0.131)
  • Adobe Flash Player 26 PPAPI (26.0.0.131)
  • Adobe Refresh Manager (1.8.0)
  • CCleaner (5.35)
  • FileZilla Client 3.36.0 (3.36.0)
  • Google Chrome (68.0.3440.106)
  • Google Update Helper (1.3.33.17)
  • Java 8 Update 92 (8.0.920.14)
  • Java Auto Updater (2.8.92.14)
  • Microsoft .NET Framework 4.6.1 (4.6.01055)
  • Microsoft Office Access MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Professional 2010 (14.0.6029.1000)
  • Microsoft Office Proof (English) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (French) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000)
  • Microsoft Office Proofing (English) 2010 (14.0.6029.1000)
  • Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Single Image 2010 (14.0.6029.1000)
  • Microsoft Office Word MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161)
  • Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
  • Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0)
  • Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2017 Redistributable (x86) - 14.15.26706 (14.15.26706.0)
  • Microsoft Visual C++ 2017 x86 Additional Runtime - 14.15.26706 (14.15.26706)
  • Microsoft Visual C++ 2017 x86 Minimum Runtime - 14.15.26706 (14.15.26706)
  • Mozilla Firefox 61.0.2 (x86 en-US) (61.0.2)
  • Notepad++ (32-bit x86) (7.5.1)
  • Opera 12.15 (12.15.1748)
  • Skype version 8.29 (8.29)
  • VLC media player (2.2.6)
  • WinRAR 5.60 (32-bit) (5.60.0)

Hotfixes

  • Client LanguagePack Package
  • Client Refresh LanguagePack Package
  • CodecPack Basic Package
  • Foundation Package
  • IE Troubleshooters Package
  • InternetExplorer Optional Package
  • KB2534111
  • KB2999226
  • KB976902
  • LocalPack AU Package
  • LocalPack CA Package
  • LocalPack GB Package
  • LocalPack US Package
  • LocalPack ZA Package
  • ProfessionalEdition
  • UltimateEdition

Behavior activities

MALICIOUS SUSPICIOUS INFO

No malicious indicators.

Check for Java to be installed
  • javaws.exe (PID: 3668)
Executes JAVA applets
  • javaws.exe (PID: 3668)
Application launched itself
  • javaws.exe (PID: 3668)
Creates files in the user directory
  • jp2launcher.exe (PID: 292)
Connects to unusual port
  • jp2launcher.exe (PID: 292)

No info indicators.

Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Static information

TRiD
.jnlp
|   Java Web Start application descriptor (88.3%)
.xml
|   Generic XML (ASCII) (11.6%)
EXIF
XMP
JnlpSpec:
1.0+
JnlpCodebase:
https://remotedeposit.myfirstfarmers.com:8443/iCapWeb
JnlpHref:
iCapture.jnlp
JnlpInformationTitle:
iCapture Thin Client
JnlpInformationVendor:
SEI 3.2.12.5
JnlpInformationHomepageHref:
http://www.softwareearnings.com
JnlpInformationDescription:
iCapture Thin Client
JnlpInformationDescriptionKind:
short
JnlpInformationOffline-allowed:
null
JnlpSecurityAll-permissions:
null
JnlpResourcesOs:
Windows
JnlpResourcesJ2seVersion:
1.6+
JnlpResourcesJ2seHref:
http://java.sun.com/products/autodl/j2se
JnlpResourcesJarHref:
sThinClient.jar
JnlpResourcesJarMain:
true
JnlpApplication-descMain-class:
com.sei.swing.client.MainFrame
JnlpApplication-descArgument:
remotedeposit.myfirstfarmers.com

Screenshots

Processes

Total processes
36
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

+
start javaws.exe no specs javaw.exe no specs javaw.exe no specs javaw.exe no specs javaws.exe jp2launcher.exe
Specs description
Program did not start
Integrity level elevation
Task сontains an error or was rebooted
Process has crashed
Task contains several apps running
Executable file was dropped
Debug information is available
Process was injected
Network attacks were detected
Application downloaded the executable file
Actions similar to stealing personal data
Behavior similar to exploiting the vulnerability
Inspected object has sucpicious PE structure
File is detected by antivirus software
CPU overrun
RAM overrun
Process starts the services
Process was added to the startup
Behavior similar to spam
Low-level access to the HDD
Probably Tor was used
System was rebooted
Connects to the network
Known threat

Process information

Click at the process to see the details.

PID
3668
CMD
"C:\Program Files\Java\jre1.8.0_92\bin\javaws.exe" "C:\Users\admin\AppData\Local\Temp\iCapture.jnlp"
Path
C:\Program Files\Java\jre1.8.0_92\bin\javaws.exe
Indicators
No indicators
Parent process
––
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Oracle Corporation
Description
Java(TM) Web Start Launcher
Version
11.92.2.14
Modules
Image
c:\program files\java\jre1.8.0_92\bin\javaws.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\progra~1\java\jre18~1.0_9\bin\msvcr100.dll
c:\progra~1\java\jre18~1.0_9\bin\deploy.dll
c:\windows\system32\wininet.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\version.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\duser.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\xmllite.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\apphelp.dll
c:\program files\java\jre1.8.0_92\bin\javaw.exe
c:\program files\java\jre1.8.0_92\bin\java.dll
c:\windows\system32\shell32.dll
c:\windows\system32\profapi.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\program files\java\jre1.8.0_92\bin\jp2launcher.exe

PID
2904
CMD
"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -cp "C:\PROGRA~1\Java\JRE18~1.0_9\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -userConfig "deployment.expiration.decision.11.92.2" "later"
Path
C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe
Indicators
No indicators
Parent process
javaws.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Oracle Corporation
Description
Java(TM) Platform SE binary
Version
8.0.920.14
Modules
Image
c:\program files\java\jre1.8.0_92\bin\javaw.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\progra~1\java\jre18~1.0_9\bin\msvcr100.dll
c:\program files\java\jre1.8.0_92\bin\client\jvm.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winmm.dll
c:\windows\system32\version.dll
c:\windows\system32\psapi.dll
c:\program files\java\jre1.8.0_92\bin\verify.dll
c:\program files\java\jre1.8.0_92\bin\java.dll
c:\program files\java\jre1.8.0_92\bin\zip.dll
c:\windows\system32\shell32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\profapi.dll
c:\program files\java\jre1.8.0_92\bin\awt.dll
c:\windows\system32\oleaut32.dll
c:\progra~1\java\jre18~1.0_9\bin\deploy.dll
c:\windows\system32\wininet.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\program files\java\jre1.8.0_92\bin\net.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wship6.dll
c:\program files\java\jre1.8.0_92\bin\nio.dll

PID
3120
CMD
"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -cp "C:\PROGRA~1\Java\JRE18~1.0_9\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -userConfig "deployment.expiration.decision.timestamp.11.92.2" "1541681539"
Path
C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe
Indicators
No indicators
Parent process
javaws.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Oracle Corporation
Description
Java(TM) Platform SE binary
Version
8.0.920.14
Modules
Image
c:\program files\java\jre1.8.0_92\bin\javaw.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\progra~1\java\jre18~1.0_9\bin\msvcr100.dll
c:\program files\java\jre1.8.0_92\bin\client\jvm.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winmm.dll
c:\windows\system32\version.dll
c:\windows\system32\psapi.dll
c:\program files\java\jre1.8.0_92\bin\verify.dll
c:\program files\java\jre1.8.0_92\bin\java.dll
c:\program files\java\jre1.8.0_92\bin\zip.dll
c:\windows\system32\shell32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\profapi.dll
c:\program files\java\jre1.8.0_92\bin\awt.dll
c:\windows\system32\oleaut32.dll
c:\progra~1\java\jre18~1.0_9\bin\deploy.dll
c:\windows\system32\wininet.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\program files\java\jre1.8.0_92\bin\net.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wship6.dll
c:\program files\java\jre1.8.0_92\bin\nio.dll

PID
3728
CMD
"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -cp "C:\PROGRA~1\Java\JRE18~1.0_9\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -userConfig "deployment.expiration.decision.suppression.11.92.2" "false"
Path
C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe
Indicators
No indicators
Parent process
javaws.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Oracle Corporation
Description
Java(TM) Platform SE binary
Version
8.0.920.14
Modules
Image
c:\program files\java\jre1.8.0_92\bin\javaw.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\progra~1\java\jre18~1.0_9\bin\msvcr100.dll
c:\program files\java\jre1.8.0_92\bin\client\jvm.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winmm.dll
c:\windows\system32\version.dll
c:\windows\system32\psapi.dll
c:\program files\java\jre1.8.0_92\bin\verify.dll
c:\program files\java\jre1.8.0_92\bin\java.dll
c:\program files\java\jre1.8.0_92\bin\zip.dll
c:\windows\system32\shell32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\profapi.dll
c:\program files\java\jre1.8.0_92\bin\awt.dll
c:\windows\system32\oleaut32.dll
c:\progra~1\java\jre18~1.0_9\bin\deploy.dll
c:\windows\system32\wininet.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\program files\java\jre1.8.0_92\bin\net.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wship6.dll
c:\program files\java\jre1.8.0_92\bin\nio.dll

PID
2244
CMD
JavaWSSplashScreen -splash 49314 "C:\Program Files\Java\jre1.8.0_92\lib\deploy\splash.gif"
Path
C:\Program Files\Java\jre1.8.0_92\bin\javaws.exe
Indicators
Parent process
javaws.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Oracle Corporation
Description
Java(TM) Web Start Launcher
Version
11.92.2.14
Modules
Image
c:\program files\java\jre1.8.0_92\bin\javaws.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\progra~1\java\jre18~1.0_9\bin\msvcr100.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\program files\java\jre1.8.0_92\bin\splashscreen.dll
c:\windows\system32\cryptbase.dll

PID
292
CMD
"C:\Program Files\Java\jre1.8.0_92\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre1.8.0_92" -vma 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 -ma QzpcVXNlcnNcYWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXGphdmF3czI=
Path
C:\Program Files\Java\jre1.8.0_92\bin\jp2launcher.exe
Indicators
Parent process
javaws.exe
User
admin
Integrity Level
MEDIUM
Version:
Company
Oracle Corporation
Description
Java(TM) Web Launcher
Version
11.92.2.14
Modules
Image
c:\program files\java\jre1.8.0_92\bin\jp2launcher.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\progra~1\java\jre18~1.0_9\bin\msvcr100.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\mpr.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\program files\java\jre1.8.0_92\bin\client\jvm.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winmm.dll
c:\windows\system32\version.dll
c:\windows\system32\psapi.dll
c:\program files\java\jre1.8.0_92\bin\verify.dll
c:\program files\java\jre1.8.0_92\bin\java.dll
c:\program files\java\jre1.8.0_92\bin\awt.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\d3d9.dll
c:\windows\system32\d3d8thk.dll
c:\windows\system32\dwmapi.dll
c:\program files\java\jre1.8.0_92\bin\jli.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\program files\java\jre1.8.0_92\bin\zip.dll
c:\windows\system32\vga.dll
c:\progra~1\java\jre18~1.0_9\bin\deploy.dll
c:\windows\system32\wininet.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\imagehlp.dll
c:\program files\java\jre1.8.0_92\bin\net.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wship6.dll
c:\program files\java\jre1.8.0_92\bin\nio.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\fwpuclnt.dll
c:\program files\java\jre1.8.0_92\bin\sunec.dll
c:\program files\java\jre1.8.0_92\bin\sunmscapi.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\napinsp.dll
c:\windows\system32\pnrpnsp.dll
c:\windows\system32\winrnr.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\program files\java\jre1.8.0_92\bin\fontmanager.dll
c:\program files\java\jre1.8.0_92\bin\t2k.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\windowscodecs.dll
c:\windows\system32\ehstorshell.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\propsys.dll
c:\windows\system32\cscui.dll
c:\windows\system32\cscdll.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\ntshrui.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\slc.dll
c:\windows\system32\imageres.dll
c:\program files\java\jre1.8.0_92\bin\dcpr.dll
c:\program files\java\jre1.8.0_92\bin\management.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll

Registry activity

Total events
203
Read events
93
Write events
100
Delete events
10

Modification events

PID
Process
Operation
Key
Name
Value
2904
javaw.exe
delete key
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
2904
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.modified.timestamp
1535457890299
2904
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.roaming.profile
false
2904
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.version
8
2904
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.expired.version
11.92.2
2904
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.browser.path
C:\Program Files\Internet Explorer\iexplore.exe
2904
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.expiration.decision.11.92.2
later
3120
javaw.exe
delete key
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
3120
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.modified.timestamp
1541681539788
3120
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.roaming.profile
false
3120
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.version
8
3120
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.expiration.decision.11.92.2
later
3120
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.expired.version
11.92.2
3120
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.browser.path
C:\Program Files\Internet Explorer\iexplore.exe
3120
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.expiration.decision.timestamp.11.92.2
1541681539
3728
javaw.exe
delete key
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
3728
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.modified.timestamp
1541681540195
3728
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.roaming.profile
false
3728
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.version
8
3728
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.expiration.decision.11.92.2
later
3728
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.expired.version
11.92.2
3728
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.expiration.decision.timestamp.11.92.2
1541681539
3728
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.browser.path
C:\Program Files\Internet Explorer\iexplore.exe
3728
javaw.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.expiration.decision.suppression.11.92.2
false
292
jp2launcher.exe
delete key
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Name
jp2launcher.exe
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.modified.timestamp
1541681540601
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.roaming.profile
false
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.expiration.decision.suppression.11.92.2
false
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.version
8
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.expiration.decision.11.92.2
later
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.expired.version
11.92.2
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.expiration.decision.timestamp.11.92.2
1541681539
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.browser.path
C:\Program Files\Internet Explorer\iexplore.exe
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
292
jp2launcher.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\jp2launcher_RASAPI32
EnableFileTracing
0
292
jp2launcher.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\jp2launcher_RASAPI32
EnableConsoleTracing
0
292
jp2launcher.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\jp2launcher_RASAPI32
FileTracingMask
4294901760
292
jp2launcher.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\jp2launcher_RASAPI32
ConsoleTracingMask
4294901760
292
jp2launcher.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\jp2launcher_RASAPI32
MaxFileSize
1048576
292
jp2launcher.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\jp2launcher_RASAPI32
FileDirectory
%windir%\tracing
292
jp2launcher.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\jp2launcher_RASMANCS
EnableFileTracing
0
292
jp2launcher.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\jp2launcher_RASMANCS
EnableConsoleTracing
0
292
jp2launcher.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\jp2launcher_RASMANCS
FileTracingMask
4294901760
292
jp2launcher.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\jp2launcher_RASMANCS
ConsoleTracingMask
4294901760
292
jp2launcher.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\jp2launcher_RASMANCS
MaxFileSize
1048576
292
jp2launcher.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\jp2launcher_RASMANCS
FileDirectory
%windir%\tracing
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
4600000069000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.javaws.appicon.index
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\appIcon\appIcon.xml
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
deployment.javaws.splash.index
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\splash\splash.xml
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\JavaSoft\Java Runtime Environment\Security Baseline
1.4.2
1.4.2_99
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\JavaSoft\Java Runtime Environment\Security Baseline
1.5.0
1.5.0_99
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\JavaSoft\Java Runtime Environment\Security Baseline
1.6.0
1.6.0_211
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\JavaSoft\Java Runtime Environment\Security Baseline
1.7.0
1.7.0_201
292
jp2launcher.exe
write
HKEY_CURRENT_USER\Software\JavaSoft\Java Runtime Environment\Security Baseline
1.8.0
1.8.0_191

Files activity

Executable files
10
Suspicious files
4
Text files
30
Unknown types
34

Dropped files

PID
Process
Filename
Type
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\security\update.securitypack.timestamp
binary
MD5: 5058f1af8388633f609cadb75a75dc9d
SHA256: cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\8\5d22c5c8-40ca1294-temp
––
MD5:  ––
SHA256:  ––
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\deployment.properties
text
MD5: 0f1d1eaff83265434678d7a0b6b5fcfe
SHA256: 1e1cdcae1720dd87cb00ad63ea8d68079d23c253291b5e5c99e78251355e4117
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\security\blacklist.dynamic
text
MD5: b2c6eae6382150192ea3912393747180
SHA256: 6c73c877b36d4abd086cb691959b180513ac5abc0c87fe9070d2d5426d3dbf71
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\security\baseline.versions
text
MD5: 97ad88685fd7fceafb3a3eb75a4eba65
SHA256: 2eb698b70b61aa048b149c55e0718523e52b79554b40114d48428e22efe7b5be
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\security\blacklisted.certs
text
MD5: d54441f027147f5d3a03180a2751ba68
SHA256: 1cb53d7ea108ede8b20e562bfa959842f264279950bd5fbc4c3709da9a618590
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\security\securitypack.jar
compressed
MD5: b2548a04ccf1365006cf1c0d84f31e0b
SHA256: 7ee8cc9a4c41da5cc2282493b2ad6ab36ef566a9359e17364bb301bba9abc302
292
jp2launcher.exe
C:\Users\admin\java0.log
text
MD5: 3423fa531ac8a1776a383cbe3d75d077
SHA256: 821d3bbf4feca0e7cd0794d85bfabb1a60fc16e4e92c9d248900f067e913ceaf
292
jp2launcher.exe
C:\Users\admin\java0.log
text
MD5: f8d1e3d4d5caffd3190cc8bd212658cd
SHA256: ffb85af448bbe433e1fe3c30d3eb5121a778c85a406da3f164e272e666e0fd8b
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\47\202866f-976f7317e19181610bae1c3cef46200993ee8b2a75e30c0a4d3b480160d7cdf6-6.0.lap
text
MD5: e9e8142fd768418b5ce706487b333eee
SHA256: 7380ccd5793c92e55d23592e919900e0e6c3448a0e2b145781071554aa02cdfd
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\deployment.properties
text
MD5: c7f5f9740b8e63277ddd2fd4dfc167c9
SHA256: 34d650126c969a8a9fce3bfe79c4be64d07b96ab7be99f652e47aa8c991a6a1e
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\47\202866f-976f7317e19181610bae1c3cef46200993ee8b2a75e30c0a4d3b480160d7cdf6-6.0.lap
text
MD5: f598ffffc7652cb104cc6f0bb991b1f9
SHA256: dcd1866ca28526b9bd0b6f69fc2f3c6be6e9436ea6b0f7db28b00a33b12cd335
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\6e2ce4ce-1c46f30f.idx
abr
MD5: aa3d88189fbe0c49ba4f7991e368b802
SHA256: 8902ffca6c1db69f2763d430adaa613d9a218cf796db1c15d876c921164134c5
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\deployment.properties
text
MD5: 344203371b12a9ca9334faf56c5488c2
SHA256: aa428b0b692a6b29a30048b6f76696e8eb8d7bae65142f9f6da843229b2991e2
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\13\5fe2e9cd-4d864bdb.idx
abr
MD5: c88c375c997985e7b3eb7539c255e6ca
SHA256: 4ae6264b16403d2dbbaf061a908f2e0dd28a776f4f6ee2f1426408d0f707345e
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\13\5fe2e9cd-4d864bdb
java
MD5: 019fe08154489b0732093434cce2c62a
SHA256: ec5b6c952cd3cfc8c2f293a66a960556bb0bf3a12372713f952ff9aad2af9098
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\13\5fe2e9cd-4d864bdb-temp
––
MD5:  ––
SHA256:  ––
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\6e2ce4ce-1c46f30f
java
MD5: 88f1c49ff50e89382c7ef6da127399de
SHA256: e211665182ed81d960b68b098a0e8f9b8d495d29ce21b550d75561710d8053ad
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\6e2ce4ce-1c46f30f-temp
––
MD5:  ––
SHA256:  ––
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\1a6bcba6-58fc7d81.idx
abr
MD5: ba7a99e846150a758d7f92caaf13500b
SHA256: 3578cdef2582d3712f4c47e109275d8c8c87db4c0c7cecf706e723f51fe17405
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\1a6bcba6-58fc7d81
java
MD5: 74ee7215166de10855220193f089ae74
SHA256: 8068fffcd32f0fbee6171ee337d515b696f5e55b8c585ca7c210a737641649ac
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\1a6bcba6-58fc7d81-temp
––
MD5:  ––
SHA256:  ––
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16\9fb3a10-77b651ef.idx
abr
MD5: a6d0ab8570a454d5d1925108108dcc80
SHA256: 52faa51616cf55ad75053320b24e04981c9a2d97481d299ba130f331813067d3
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\1\43f3f501-58162fd5.idx
abr
MD5: 4b3946de989bf67e1558e0b1d2283d07
SHA256: 9a1f1c8fdf3188973f76e55a154dad7b47b24852f21eb5ff06ec3c67c3d9c27e
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\1\43f3f501-58162fd5
java
MD5: 1e2b89bed1b7b262c78d5cc6bf5c064f
SHA256: 83dae34386305b9106f269e675da098ecd7a5d7b98e30d63cca9b5edf2db5d1e
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\1\43f3f501-58162fd5-temp
––
MD5:  ––
SHA256:  ––
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16\9fb3a10-77b651ef
java
MD5: 78808876c29f74d5b1dbd5aa328013f7
SHA256: 6cd975334a077f54ae91e3294c4bc4ff0ce871feeeaef79178ba9cb963cd34a9
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16\9fb3a10-77b651ef-temp
––
MD5:  ––
SHA256:  ––
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\0\4fc79d80-616d74f8.idx
abr
MD5: f511f384694f002b87b7a07ed13d869d
SHA256: ef868b01e6889cbd4d7f776f20138c2e3147be5ef7bcc888ef7afb7f50f3c1c1
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\0\4fc79d80-616d74f8
java
MD5: 761995a6e7e91c94ae40a0b55cbabee4
SHA256: 8f2c635c43d76fe608c8e3611bdf4f86175a9b314a254c01360dfcf6c3df6c90
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\0\4fc79d80-616d74f8-temp
––
MD5:  ––
SHA256:  ––
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\6e2ce4ce-1c46f30f.idx
abr
MD5: 7a2b2a6a7418160b22d307f5bea63383
SHA256: f7118afb02ddeac1d903751e9e0f252ca7bde1b5357ce966c777d471d1e1e50d
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\8\5d22c5c8-40ca1294.idx
abr
MD5: 108319ac9cab98548c0e0da25407862c
SHA256: 9814c6dce8bc4591852ba40aaf852483ce68d5ce4dd2de0b0d0e6c7f0ee9ac87
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\8\5d22c5c8-40ca1294
java
MD5: c71e42e24aaa6ff99d357761dcc93313
SHA256: c2660b57a0ffccc48376067cca54b597276a3647b02dadbca09af3234b57bba9
292
jp2launcher.exe
C:\Users\admin\java0.log
text
MD5: 65cebba4dcfd95eb18775f6e41a2fba9
SHA256: 40ba8978e2b46f3428a02332513c95c3769bcf3f8de8e2115bcb3d5e1fe35f38
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\13\5fe2e9cd-4d864bdb.idx
abr
MD5: 7a2b2a6a7418160b22d307f5bea63383
SHA256: f7118afb02ddeac1d903751e9e0f252ca7bde1b5357ce966c777d471d1e1e50d
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\27\6c1eef9b-6f75035c.idx
abr
MD5: 40b2e01d041241cb2e2108150f59ef0a
SHA256: 5a0a1c85339bbcd504556e81f19cae08c103d35a5688f98790e263376b3e6b03
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\27\6c1eef9b-6f75035c
java
MD5: 55124c4c553ce87307c9c8bbb5486078
SHA256: 57414ce80c771167f8b7d9cb5d12fe209dd15cc8962038ff2c3a444d7b0ceab4
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\27\6c1eef9b-6f75035c-temp
––
MD5:  ––
SHA256:  ––
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\45\1738982d-720bdf47.idx
abr
MD5: f5619bd4f6e30f24006fd0dfb71ce878
SHA256: 6d03b074f071e95917373196f33ea760c30cd64d249898d32da3f284f2a61e97
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\27\6c1eef9b-6f75035c.idx
abr
MD5: 7a2b2a6a7418160b22d307f5bea63383
SHA256: f7118afb02ddeac1d903751e9e0f252ca7bde1b5357ce966c777d471d1e1e50d
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\45\1738982d-720bdf47
java
MD5: abade1f625843914119a9046ca508698
SHA256: 971b682ae532d2faf5f8aafdea9a2ecf026c216cc39b0951f53e1ee4059a71d3
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\45\1738982d-720bdf47-temp
––
MD5:  ––
SHA256:  ––
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16\9fb3a10-77b651ef.idx
abr
MD5: 7a2b2a6a7418160b22d307f5bea63383
SHA256: f7118afb02ddeac1d903751e9e0f252ca7bde1b5357ce966c777d471d1e1e50d
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\8\5d22c5c8-40ca1294.idx
abr
MD5: 7a2b2a6a7418160b22d307f5bea63383
SHA256: f7118afb02ddeac1d903751e9e0f252ca7bde1b5357ce966c777d471d1e1e50d
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\45\1738982d-720bdf47.idx
abr
MD5: 7a2b2a6a7418160b22d307f5bea63383
SHA256: f7118afb02ddeac1d903751e9e0f252ca7bde1b5357ce966c777d471d1e1e50d
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\43\743d94ab-79867acf.idx
abr
MD5: e625a06079b0af5723b74b89ac12dfae
SHA256: b50f0bc8e9485b9efbe00d22be57473c0b1b049f169c504e7d0a7311586631e4
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\security\blacklist.cache
binary
MD5: 5fc0ecc5bc586d6cf605f844f162f051
SHA256: 6e2bffbf08081f926fe899a34fa7b0e0f355186583ee067925b8ecb5b4f274c0
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\43\743d94ab-79867acf
java
MD5: ef2fe02a88ae789fd95a09236553b3b4
SHA256: 6d4c964805d30ef216da3779a6aabf28b0672b12b70ec35629fe5ff426526f0b
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\43\743d94ab-79867acf-temp
––
MD5:  ––
SHA256:  ––
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\47\202866f-976f7317e19181610bae1c3cef46200993ee8b2a75e30c0a4d3b480160d7cdf6-6.0.lap
text
MD5: c00b48ce4d5e052a8bc8075cba490ef4
SHA256: d48fd21327ce8be97ffd9fa20fcf369e7c58e317f2ec14836a16fdee6202df50
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\47\202866f-79fc3457.idx
abr
MD5: 2e1116cd142aefe7b5a0b5f2ee1e0fb3
SHA256: d11c959092f8598a5c1260db7e255a62d14af2781e414ca1f16af188365a223e
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\47\202866f-79fc3457
xml
MD5: 374c3c4f82e4b9dacdd47ddbeb3f75cc
SHA256: d5e48bec5f07fc3fb83b5ed2d1cc8f0c13ae233980250fe99f0ea8817b7e6b3c
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\lastAccessed
binary
MD5: 5058f1af8388633f609cadb75a75dc9d
SHA256: cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\47\202866f-79fc3457-temp
––
MD5:  ––
SHA256:  ––
292
jp2launcher.exe
C:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302019708-1500728564-335382590-1000\83aa4cc77f591dfc2374580bbd95f6ba_90059c37-1320-41a4-b58d-2b75a9850d2f
dbf
MD5: c8366ae350e7019aefc9d1e6e6a498c6
SHA256: 11e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238
292
jp2launcher.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\deployment.properties
text
MD5: 30b6a90da830b6e8cd6e825d536b2c1c
SHA256: 1e5e4363aa2e63360a9c9178bcfd11787fc63515bcd1bf9bf7ad4bda09e41a49
292
jp2launcher.exe
C:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamp
text
MD5: 41c11559c3bc25653e9f0d17749c703a
SHA256: 938692764ec14d3a7e0b895fead9e63d43e1d5778f9f9a7656b1507437c6cd07
3668
javaws.exe
C:\Users\admin\AppData\Local\Temp\javaws2
xml
MD5: 374c3c4f82e4b9dacdd47ddbeb3f75cc
SHA256: d5e48bec5f07fc3fb83b5ed2d1cc8f0c13ae233980250fe99f0ea8817b7e6b3c
3728
javaw.exe
C:\Users\admin\AppData\Local\Temp\JavaDeployReg.log
text
MD5: 6ec01348dca8010bef30d89b3d1e11d7
SHA256: cd3bf9ca2cad8d5760bbd5402f8a9315f1510165710649e585b8fbf7fad70049
3728
javaw.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\deployment.properties
text
MD5: 8059fe6689a4268899b962289a886730
SHA256: f3da38e2f331835dc6dd4e68df72b09e099f181986b38f03448c7516ac413be0
3728
javaw.exe
C:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamp
text
MD5: 09a973855965209ab0ba08d96eb041ca
SHA256: c0a3d3a978974e3d14cca476df352c4247bf28fdabe2cbef3da527a0b6540162
3120
javaw.exe
C:\Users\admin\AppData\Local\Temp\JavaDeployReg.log
text
MD5: ba74e2a6d0ee8470cb1e3302570927ea
SHA256: 80ce47d47233191c6f8d7d55d4a43add783bb561183ccdb82c678e67f75cdb6b
3120
javaw.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\deployment.properties
text
MD5: fc5cda83a4f1d11a2e3323761e53cb38
SHA256: 8d57612ae07f0a3f47e23edf258d29ddd8a2d1963ab0f76b3f14e4e94cdb00af
3120
javaw.exe
C:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamp
text
MD5: 439e604aa78fea83becdf574a98b4c8e
SHA256: 444ac3f388ec0fa5594d93a087e009e8419e70b321830deb31a006503324e018
2904
javaw.exe
C:\Users\admin\AppData\Local\Temp\JavaDeployReg.log
text
MD5: c9e7e7acf925e83e7050c71ad3390fbb
SHA256: 4422d367bad2bded188fe9412ae56422713beea27bce1622952a499b2a3b676e
2904
javaw.exe
C:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\deployment.properties
text
MD5: 13414f6f62ef9875ef6d2907938b19cc
SHA256: c250d22f71f67bfa0236f9f0dbb4004082f73b7d1882881618e1858b0addb3f5
2904
javaw.exe
C:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamp
text
MD5: 792fe1b179fa0599b0235724bc86bebf
SHA256: db8119e21b93f3de70f5f13acfa7383b0bddf88fde657286413d1b87765740ed

Find more information of the staic content and download it at the full report

Network activity

HTTP(S) requests
8
TCP/UDP connections
59
DNS requests
5
Threats
0

HTTP requests

PID Process Method HTTP Code IP URL CN Type Size Reputation
292 jp2launcher.exe POST 200 188.121.36.239:80 http://ocsp.godaddy.com/ NL
binary
der
whitelisted
292 jp2launcher.exe POST 200 188.121.36.239:80 http://ocsp.godaddy.com/ NL
binary
der
whitelisted
292 jp2launcher.exe POST 200 188.121.36.239:80 http://ocsp.godaddy.com/ NL
binary
der
whitelisted
292 jp2launcher.exe POST 200 188.121.36.239:80 http://ocsp.godaddy.com/ NL
binary
der
whitelisted
292 jp2launcher.exe POST 200 188.121.36.239:80 http://ocsp.godaddy.com/ NL
binary
der
whitelisted
292 jp2launcher.exe POST 200 188.121.36.239:80 http://ocsp.godaddy.com/ NL
binary
der
whitelisted
292 jp2launcher.exe POST 200 23.37.43.27:80 http://s2.symcb.com/ NL
binary
der
whitelisted
292 jp2launcher.exe POST 200 23.37.43.27:80 http://sv.symcd.com/ NL
binary
der
whitelisted

Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID Process IP ASN CN Reputation
292 jp2launcher.exe 12.23.248.187:8443 AT&T Services, Inc. US unknown
292 jp2launcher.exe 188.121.36.239:80 GoDaddy.com, LLC NL unknown
292 jp2launcher.exe 184.31.87.231:443 Akamai International B.V. NL whitelisted
292 jp2launcher.exe 23.37.43.27:80 Akamai Technologies, Inc. NL whitelisted

DNS requests

Domain IP Reputation
remotedeposit.myfirstfarmers.com 12.23.248.187
unknown
ocsp.godaddy.com 188.121.36.239
whitelisted
javadl-esd-secure.oracle.com 184.31.87.231
whitelisted
s2.symcb.com 23.37.43.27
whitelisted
sv.symcd.com 23.37.43.27
whitelisted

Threats

No threats detected.

Debug output strings

No debug info.