Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 04:04

General

  • Target

    65f192b256c688d9f82608e53c29c52c_JaffaCakes118.js

  • Size

    940KB

  • MD5

    65f192b256c688d9f82608e53c29c52c

  • SHA1

    3e9d5031d789f77493d182002594b80f44592e1e

  • SHA256

    4f549a0eac1aa2b72aa4506bf9c1ec0b6f66eb713d0fe2cca63daa45a1eba398

  • SHA512

    a10fefa07d5c4adaf6a581df43c9b2a2bc7071cb4f4b0a8cd3341f989a4b6a4356844139513ec95bde45749bc0b573faa96d05600297e8b019a4910de1dc32a4

  • SSDEEP

    12288:1d86km4GOLX0N0gwITHCHFMcILmikwyMaY6lM9AjtVrZ48JldQ8kdDRvi1LbVu6u:1doRhXmHFL/MlMq1JldQ86yE674b

Malware Config

Signatures

  • AdWind

    A Java-based RAT family operated as malware-as-a-service.

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 25 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in System32 directory 3 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 30 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\65f192b256c688d9f82608e53c29c52c_JaffaCakes118.js
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4272
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3704
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:4180
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:2696
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:1964
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:4044
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:3660
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:2044
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:4472
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:3216
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:3856
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:2312
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:4940
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:4408
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:4216
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:2060
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:3500
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:4888
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:2396
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:680
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:4452
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:3580
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:4844
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:1324
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:4620
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:2236
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:1380
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:1928
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:4780
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:2656
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:4184
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js
        3⤵
        • Creates scheduled task(s)
        PID:3076
    • C:\Program Files\Java\jre-1.8\bin\javaw.exe
      "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\pormsuvfv.txt"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3248
      • C:\Windows\system32\icacls.exe
        C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
        3⤵
        • Modifies file permissions
        PID:3416
      • C:\Program Files\Java\jre-1.8\bin\java.exe
        "C:\Program Files\Java\jre-1.8\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.65542190233514277305562422361795586.class
        3⤵
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4916
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive1198539576509588880.vbs
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2196
          • C:\Windows\system32\cscript.exe
            cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive1198539576509588880.vbs
            5⤵
              PID:116
          • C:\Windows\SYSTEM32\cmd.exe
            cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive6222493739582978814.vbs
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2368
            • C:\Windows\system32\cscript.exe
              cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive6222493739582978814.vbs
              5⤵
                PID:1640
            • C:\Windows\SYSTEM32\xcopy.exe
              xcopy "C:\Program Files\Java\jre-1.8" "C:\Users\Admin\AppData\Roaming\Oracle\" /e
              4⤵
                PID:1456
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive4716584740094318448.vbs
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:5024
              • C:\Windows\system32\cscript.exe
                cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive4716584740094318448.vbs
                4⤵
                  PID:5084
              • C:\Windows\SYSTEM32\cmd.exe
                cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive1834174782275568457.vbs
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:724
                • C:\Windows\system32\cscript.exe
                  cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive1834174782275568457.vbs
                  4⤵
                    PID:2128
                • C:\Windows\SYSTEM32\xcopy.exe
                  xcopy "C:\Program Files\Java\jre-1.8" "C:\Users\Admin\AppData\Roaming\Oracle\" /e
                  3⤵
                    PID:336
                  • C:\Windows\SYSTEM32\cmd.exe
                    cmd.exe
                    3⤵
                      PID:1496
                    • C:\Windows\SYSTEM32\reg.exe
                      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v YUowJwVZcwP /t REG_EXPAND_SZ /d "\"C:\Users\Admin\AppData\Roaming\Oracle\bin\javaw.exe\" -jar \"C:\Users\Admin\XzelmuCLxFW\erKrtMzEQtL.eQKRGy\"" /f
                      3⤵
                      • Adds Run key to start application
                      • Modifies registry key
                      PID:1948
                    • C:\Windows\SYSTEM32\attrib.exe
                      attrib +h "C:\Users\Admin\XzelmuCLxFW\*.*"
                      3⤵
                      • Views/modifies file attributes
                      PID:2192
                    • C:\Windows\SYSTEM32\attrib.exe
                      attrib +h "C:\Users\Admin\XzelmuCLxFW"
                      3⤵
                      • Views/modifies file attributes
                      PID:4924
                    • C:\Users\Admin\AppData\Roaming\Oracle\bin\javaw.exe
                      C:\Users\Admin\AppData\Roaming\Oracle\bin\javaw.exe -jar C:\Users\Admin\XzelmuCLxFW\erKrtMzEQtL.eQKRGy
                      3⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:2960
                      • C:\Users\Admin\AppData\Roaming\Oracle\bin\java.exe
                        C:\Users\Admin\AppData\Roaming\Oracle\bin\java.exe -jar C:\Users\Admin\AppData\Local\Temp\_0.63006804481146847831995820879930306.class
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:4920
                        • C:\Windows\SYSTEM32\cmd.exe
                          cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive8845431109458457651.vbs
                          5⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3036
                          • C:\Windows\system32\cscript.exe
                            cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive8845431109458457651.vbs
                            6⤵
                              PID:3216
                          • C:\Windows\SYSTEM32\cmd.exe
                            cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive3139798080617243201.vbs
                            5⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1808
                            • C:\Windows\system32\cscript.exe
                              cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive3139798080617243201.vbs
                              6⤵
                                PID:2108
                            • C:\Windows\SYSTEM32\cmd.exe
                              cmd.exe
                              5⤵
                                PID:3944
                            • C:\Windows\SYSTEM32\cmd.exe
                              cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive3832416478722706875.vbs
                              4⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2444
                              • C:\Windows\system32\cscript.exe
                                cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive3832416478722706875.vbs
                                5⤵
                                  PID:3972
                              • C:\Windows\SYSTEM32\cmd.exe
                                cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive6423449245004066202.vbs
                                4⤵
                                • Suspicious use of WriteProcessMemory
                                PID:4884
                                • C:\Windows\system32\cscript.exe
                                  cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive6423449245004066202.vbs
                                  5⤵
                                    PID:4520
                                • C:\Windows\SYSTEM32\cmd.exe
                                  cmd.exe
                                  4⤵
                                    PID:4968

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

                              Filesize

                              46B

                              MD5

                              fe5d4000366104842463844f224b9de1

                              SHA1

                              6918a8bcd5dbfeaaff4b8f783a4ff972f857435c

                              SHA256

                              f6f94184856da509e8676416d47504c3835842c9891437860bca00583107472e

                              SHA512

                              ced2e1af5aee211bcc1415bdb5c23d929ce3a5611742349ea0ca1196725f70332a0db0521c4a4b220df014ac1f4b8427208d2bc7a67c23a9292a7f1d04597b9c

                            • C:\ProgramData\Oracle\Java\.oracle_jre_usage\50569f7db71fa7f8.timestamp

                              Filesize

                              54B

                              MD5

                              afefa7fd7ee8733735710484229c1e61

                              SHA1

                              7fc8cd3146a0581b66bbc18346f64aa36b19b6b9

                              SHA256

                              1c8a40450a029bdc3f6922247c96d3e7f7c9db8a9a489de05b79f0a73331d4d4

                              SHA512

                              c3c7c127cae4282d1f6a28189203699fcabef7ae8f96ac555bc102cf52b6db9f87023c8174cb5f64f5b24c6dbba239c24921f59aebd7878aa0a7215c9fa86b01

                            • C:\Users\Admin\AppData\Local\Temp\Retrive4716584740094318448.vbs

                              Filesize

                              276B

                              MD5

                              3bdfd33017806b85949b6faa7d4b98e4

                              SHA1

                              f92844fee69ef98db6e68931adfaa9a0a0f8ce66

                              SHA256

                              9da575dd2d5b7c1e9bab8b51a16cde457b3371c6dcdb0537356cf1497fa868f6

                              SHA512

                              ae5e5686ae71edef53e71cd842cb6799e4383b9c238a5c361b81647efa128d2fedf3bf464997771b5b0c47a058fecae7829aeedcd098c80a11008581e5781429

                            • C:\Users\Admin\AppData\Local\Temp\Retrive6222493739582978814.vbs

                              Filesize

                              281B

                              MD5

                              a32c109297ed1ca155598cd295c26611

                              SHA1

                              dc4a1fdbaad15ddd6fe22d3907c6b03727b71510

                              SHA256

                              45bfe34aa3ef932f75101246eb53d032f5e7cf6d1f5b4e495334955a255f32e7

                              SHA512

                              70372552dc86fe02ece9fe3b7721463f80be07a34126b2c75b41e30078cda9e90744c7d644df623f63d4fb985482e345b3351c4d3da873162152c67fc6ecc887

                            • C:\Users\Admin\AppData\Local\Temp\_0.65542190233514277305562422361795586.class

                              Filesize

                              241KB

                              MD5

                              781fb531354d6f291f1ccab48da6d39f

                              SHA1

                              9ce4518ebcb5be6d1f0b5477fa00c26860fe9a68

                              SHA256

                              97d585b6aff62fb4e43e7e6a5f816dcd7a14be11a88b109a9ba9e8cd4c456eb9

                              SHA512

                              3e6630f5feb4a3eb1dac7e9125ce14b1a2a45d7415cf44cea42bc51b2a9aa37169ee4a4c36c888c8f2696e7d6e298e2ad7b2f4c22868aaa5948210eb7db220d8

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2539840389-1261165778-1087677076-1000\83aa4cc77f591dfc2374580bbd95f6ba_468f6343-c0e6-4931-9703-30c6539573cb

                              Filesize

                              45B

                              MD5

                              c8366ae350e7019aefc9d1e6e6a498c6

                              SHA1

                              5731d8a3e6568a5f2dfbbc87e3db9637df280b61

                              SHA256

                              11e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238

                              SHA512

                              33c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd

                            • C:\Users\Admin\AppData\Roaming\Oracle\bin\awt.dll

                              Filesize

                              1.3MB

                              MD5

                              88533755e937c3f8075e4fb9171518ed

                              SHA1

                              32190e58f984abbbc9c258dbc2113e54efcbd456

                              SHA256

                              3bf975bbb65d9af983cee29afb32fe8e260bb9063f7948a132dcf9edfc1bf5b2

                              SHA512

                              0cf01dfdf5b48e735b9b008355968e869d199e2dce534cb3fd3d68578b68e7c1a46727f87927ee84eb1fbab6b9e90b4a98f0c91837f384f257249fb43fbd97d6

                            • C:\Users\Admin\AppData\Roaming\Oracle\bin\java.dll

                              Filesize

                              162KB

                              MD5

                              583e8b42864ec183c945164f373cb375

                              SHA1

                              5ec118befbb5d17593a05db2899ee52f7267da37

                              SHA256

                              9bc9178d3f4246433fe209a0f5ca70e77568e80c928268c78f8c8b00107ce6ed

                              SHA512

                              1feaac37bac19bde93171ebda2e76a65e9d5472a503b05939f6977b3a4d94d131298f3989dd048d7617ecd69cf09db7ac986fc39f0df9f56c84ea01726d0c898

                            • C:\Users\Admin\AppData\Roaming\Oracle\bin\java.exe

                              Filesize

                              285KB

                              MD5

                              1562e15220d8771fcb11b9a5b234a970

                              SHA1

                              50ec8e4e7125bda147a1b2ccc2b2827db2dc3479

                              SHA256

                              366199821c1efede3f7112d21da045fd6bf38b56fb3da1ae9d6493c4ddc1861f

                              SHA512

                              a07873f0a5381d202a6439a3245dd51f405cdcec4a9d40ff6ffdd4670a3b218008f7288a89e2a7455782c677d4c661bda96e62f813ce7d8c1f20a6c4c7c2b31f

                            • C:\Users\Admin\AppData\Roaming\Oracle\bin\javaw.exe

                              Filesize

                              285KB

                              MD5

                              122e34bfa3146ef9ae5a51fdc744353f

                              SHA1

                              f0cc2294fe150a4cceca8a3da8615edcc4eb20e4

                              SHA256

                              dd2169db3358ccdf4a4a185e4a22955c989eaa3b9d3e0e6025599b8fa173c968

                              SHA512

                              306341e00598f02a70d3edc6ef666cb64982f1e31e5c0a1304977a1700c95395c1c7f0857ae8056853370eced0bd2aeafc72da804a65f98c1422929b7c431700

                            • C:\Users\Admin\AppData\Roaming\Oracle\bin\net.dll

                              Filesize

                              104KB

                              MD5

                              818fc60312c5ef0010e1a0367019005c

                              SHA1

                              bec6ce9b8330bd90c6f0527aa01871ec6b2ab018

                              SHA256

                              b090636931f9b5767c2a2c82ca4e5efbf65ce1a79630b48dea47ed01e1d81988

                              SHA512

                              43339d3407aaf85fa94aa3ff22ed3f457b29c93403a7ea19abbec50d4b5fee14fd415e70ac856a84c76530571a5a03eb8c5eae558edad6a64fcc3a3755dc3d5c

                            • C:\Users\Admin\AppData\Roaming\Oracle\bin\nio.dll

                              Filesize

                              66KB

                              MD5

                              4c8dbf6bb8438a43adecb07b90ec37d4

                              SHA1

                              d33ac1a59b79a8894f0225eca238b6c40649145b

                              SHA256

                              35b203dbdf6716bd7e35a66127acb5ae7d869388ee3778e8a956d1b54bfd15a1

                              SHA512

                              fc08a1390c87fb077758887cd89acec0326ac5332cb380771d8d0edd9e810c8e7fad43ad5800577307cad4ffb3007266d5cf56c7c726bac3939d908ac86eff8f

                            • C:\Users\Admin\AppData\Roaming\Oracle\bin\plugin2\msvcp140.dll

                              Filesize

                              558KB

                              MD5

                              bf78c15068d6671693dfcdfa5770d705

                              SHA1

                              4418c03c3161706a4349dfe3f97278e7a5d8962a

                              SHA256

                              a88b8c1c8f27bf90fe960e0e8bd56984ad48167071af92d96ec1051f89f827fb

                              SHA512

                              5b6b0ab4e82cc979eaa619d387c6995198fd19aa0c455bef44bd37a765685575d57448b3b4accd70d3bd20a6cd408b1f518eda0f6dae5aa106f225bee8291372

                            • C:\Users\Admin\AppData\Roaming\Oracle\bin\plugin2\vcruntime140.dll

                              Filesize

                              95KB

                              MD5

                              7415c1cc63a0c46983e2a32581daefee

                              SHA1

                              5f8534d79c84ac45ad09b5a702c8c5c288eae240

                              SHA256

                              475ab98b7722e965bd38c8fa6ed23502309582ccf294ff1061cb290c7988f0d1

                              SHA512

                              3d4b24061f72c0e957c7b04a0c4098c94c8f1afb4a7e159850b9939c7210d73398be6f27b5ab85073b4e8c999816e7804fef0f6115c39cd061f4aaeb4dcda8cf

                            • C:\Users\Admin\AppData\Roaming\Oracle\bin\plugin2\vcruntime140_1.dll

                              Filesize

                              36KB

                              MD5

                              fcda37abd3d9e9d8170cd1cd15bf9d3f

                              SHA1

                              b23ff3e9aa2287b9c1249a008c0ae06dc8b6fdf2

                              SHA256

                              0579d460ea1f7e8a815fa55a8821a5ff489c8097f051765e9beaf25d8d0f27d6

                              SHA512

                              de8be61499aaa1504dde8c19666844550c2ea7ef774ecbe26900834b252887da31d4cf4fb51338b16b6a4416de733e519ebf8c375eb03eb425232a6349da2257

                            • C:\Users\Admin\AppData\Roaming\Oracle\bin\server\jvm.dll

                              Filesize

                              8.5MB

                              MD5

                              36e3e370db5f0b66689811b41f1a8445

                              SHA1

                              7fcbe290c3a6a0827b77af78115a1b4bc834d685

                              SHA256

                              9f28a06990d2ed1d14130072109e37e733b3a7d4922e325e679dd4d917741550

                              SHA512

                              f93bc4ca946e383ee1edfef3c7b5574585d23d660a4cc3db5b6b203f6111a3fe1f245d583ca53852888ac67812fb6efd0d121d0643180875baeb0d7b811d4db9

                            • C:\Users\Admin\AppData\Roaming\Oracle\bin\sunec.dll

                              Filesize

                              142KB

                              MD5

                              fd3dcda8909ec5575b3b0acf6f219585

                              SHA1

                              4ae6dc79730e54231ff1f970515e3a16a4287fa6

                              SHA256

                              f70ceddab71854c9c59f412cec6be5d6b918a1b2ee23f7952354a00b71cc407a

                              SHA512

                              16b24f09943b7b92a92adfbdac6a274147e9eb54eae5a2d24eb07129dfced0b9b4f2ddaff6cf3e21c295af99f4b676be9084d72a1493d6c3cba9c91535a4bfb5

                            • C:\Users\Admin\AppData\Roaming\Oracle\bin\verify.dll

                              Filesize

                              55KB

                              MD5

                              0fcda2fc9a161614e68d74f4d9eecc2d

                              SHA1

                              d3734149ff561209aa9e851ea958012e20ce41da

                              SHA256

                              b1cf5a699d1a48691c2fe8dfad1c8c8aa1c4013c52b4107bad905faf037ddffa

                              SHA512

                              5402af47558721f084f5f05264e160bd43ebe265c2d2e3b415c2a0ea7bf9adf7aebb76e2c12dcf93ae5bf10d00f4c80aa3a97f35c02eb3279df9c675f3a037bc

                            • C:\Users\Admin\AppData\Roaming\Oracle\bin\zip.dll

                              Filesize

                              87KB

                              MD5

                              2ca64779a19ba733a408edd9511b7c37

                              SHA1

                              99ad8571bc8cd48efba19a48066c0f0dd321ecc1

                              SHA256

                              c3c3365932d865e111972184ae12dc3853dc7e5d6df2f474dbeee5faead92cd3

                              SHA512

                              0822bb0e4d18115d325f3981ad15cb036d5a9f845d2c68975c5e9164b5fbdab0fdd4e882d3b8001f58271b7b38cba9bdc1299ccfab00ce0321f396aa8bf248a5

                            • C:\Users\Admin\AppData\Roaming\Oracle\lib\accessibility.properties

                              Filesize

                              149B

                              MD5

                              2ed483df31645d3d00c625c00c1e5a14

                              SHA1

                              27c9b302d2d47aae04fc1f4ef9127a2835a77853

                              SHA256

                              68ef2f3c6d7636e39c6626ed1bd700e3a6b796c25a9e5feca4533abfacd61cdf

                              SHA512

                              4bf6d06f2ceaf070df4bd734370def74a6dd545fd40efd64a948e1422470ef39e37a4909feeb8f0731d5badb3dd9086e96dace6bdca7bbd3078e8383b16894da

                            • C:\Users\Admin\AppData\Roaming\Oracle\lib\amd64\jvm.cfg

                              Filesize

                              634B

                              MD5

                              499f2a4e0a25a41c1ff80df2d073e4fd

                              SHA1

                              e2469cbe07e92d817637be4e889ebb74c3c46253

                              SHA256

                              80847ed146dbc5a9f604b07ec887737fc266699abba266177b553149487ce9eb

                              SHA512

                              7828f7b06d0f4309b9edd3aa71ae0bb7ee92d2f8df5642c13437bba2a3888e457dc9b24c16aa9e0f19231530cb44b8ccd955cbbdf5956ce8622cc208796b357d

                            • C:\Users\Admin\AppData\Roaming\Oracle\lib\charsets.jar

                              Filesize

                              2.9MB

                              MD5

                              a5b8d1a15884d8450ec905fc08d6e1d2

                              SHA1

                              472cdfe3f3bf1e719e3bc73f008f26960d2a74fc

                              SHA256

                              94e16e5ba8033fc3cd2a2e731b6326958dfe7c9b70fd4826eb2c0709a656d83d

                              SHA512

                              3eee8ff3e969161d551903a1687db379f516ddfe4bec35c508964012a58895a45a36d4efcd06a60448f3ec764c4f3dd7e317445c32e23b8c888b68361747e330

                            • C:\Users\Admin\AppData\Roaming\Oracle\lib\deploy\messages_zh_TW.properties

                              Filesize

                              3KB

                              MD5

                              880baacb176553deab39edbe4b74380d

                              SHA1

                              37a57aad121c14c25e149206179728fa62203bf0

                              SHA256

                              ff4a3a92bc92cb08d2c32c435810440fd264edd63e56efa39430e0240c835620

                              SHA512

                              3039315bb283198af9090bd3d31cfae68ee73bc2b118bbae0b32812d4e3fd0f11ce962068d4a17b065dab9a66ef651b9cb8404c0a2defce74bb6b2d1d93646d5

                            • C:\Users\Admin\AppData\Roaming\Oracle\lib\ext\meta-index

                              Filesize

                              1KB

                              MD5

                              af03d781ec85caa0f45e6e29830ce112

                              SHA1

                              ef3dd2f731903182e47cb83cdf275f5f0e58b3db

                              SHA256

                              8c55ed28260fcd7fd4e5d68e871a735148c01a711545602c2c26aa9d6653c05c

                              SHA512

                              df080f8c206ba125f5ce4129640fc05e9fc5b00fd87fe08866bbc7b67f5caa3ec2792dd874d49253a70ea0a9c3856c2e8ba4c39728656854a290cfdf6ba683a3

                            • C:\Users\Admin\AppData\Roaming\Oracle\lib\ext\sunec.jar

                              Filesize

                              46KB

                              MD5

                              5aff6406c285d0ef2e8d7946b2eb01f8

                              SHA1

                              fef27bfeff7242ea820c90665d684fcacd770505

                              SHA256

                              6507274374d7d50eb6bf5998288760988deccc16ed7934ad8a182c2500f0405c

                              SHA512

                              c94f1b7d30d74914ed973892f8f3200a20206caeec41e99feef9b58b9e4354260b396eb464e2162d740315f000d7bd1c811ef7520301fdc65dcfd0af648deb65

                            • C:\Users\Admin\AppData\Roaming\Oracle\lib\ext\sunjce_provider.jar

                              Filesize

                              288KB

                              MD5

                              d48c3b0a549c1b0a72cc5bc63a4cc979

                              SHA1

                              542d860693da662555cea10986e533e374b52326

                              SHA256

                              a5d33f76829de19bd1eef234cf148c1f984707480befa81b4811bad21886a050

                              SHA512

                              f8f8e949bfc809a8504d810ceb4e75aad27008aba9aba27bc84dba77ebb7c05f8dc7f8a33b83d51d0872f9ce43ede3f26a51e9fc8eb17558c72b684c2bed73d6

                            • C:\Users\Admin\AppData\Roaming\Oracle\lib\images\cursors\win32_CopyNoDrop32x32.gif

                              Filesize

                              153B

                              MD5

                              1e9d8f133a442da6b0c74d49bc84a341

                              SHA1

                              259edc45b4569427e8319895a444f4295d54348f

                              SHA256

                              1a1d3079d49583837662b84e11d8c0870698511d9110e710eb8e7eb20df7ae3b

                              SHA512

                              63d6f70c8cab9735f0f857f5bf99e319f6ae98238dc7829dd706b7d6855c70be206e32e3e55df884402483cf8bebad00d139283af5c0b85dc1c5bf8f253acd37

                            • C:\Users\Admin\AppData\Roaming\Oracle\lib\jce.jar

                              Filesize

                              120KB

                              MD5

                              99247d1d5370a784e438416e599abe36

                              SHA1

                              2f958cccadeb2d991e41edccece08bc1a64368cf

                              SHA256

                              f5700ffd6842bff801307c09e02ce3ca9792eb2cd4d34e79563bf77ff44ae531

                              SHA512

                              e3380e411f1b7219df659cbb4691cf3cd23c66f4af428f3b71539e579b6c2ce8209fad949f3909337a89282fd5c1d1eacf2a1acc34ff129c69c7b0bdb1b65a35

                            • C:\Users\Admin\AppData\Roaming\Oracle\lib\jfr.jar

                              Filesize

                              566KB

                              MD5

                              9868c5f7a74f603107ecdb43a367d91b

                              SHA1

                              6b5499786196c71c7c2ff63d1f15d70b4c0164a8

                              SHA256

                              8660a4dd44225c06a79afb5e8015a74cd610c50c777b4b2737008d179b69dd83

                              SHA512

                              1740c646cc0b83398ff0aa6c7b297cd4882840c9cae28fbac4914617764cc21c2026539b7eaf9209fff8d3b1df89a09299021f43910c07e434060434461daa8e

                            • C:\Users\Admin\AppData\Roaming\Oracle\lib\jsse.jar

                              Filesize

                              1.7MB

                              MD5

                              6b4188fce8bf2334732741b2f3c3c864

                              SHA1

                              95dfc9d9709f9b6e7fce99bc02a3bc7d1fde75d8

                              SHA256

                              46599d42d2c0b9bc6484a5b2d5a53bb5d9b238bef9c87f006acd61cc52bdb0ff

                              SHA512

                              59cbc0820e01fcf7a62675aa9bece9afd2ca20c3cca4b7033394c398e669b0b7f7ec5ac97486fecfb6fa48187b7faa0fb1fb5987e93c6a0a5e85e99b9ddda590

                            • C:\Users\Admin\AppData\Roaming\Oracle\lib\meta-index

                              Filesize

                              2KB

                              MD5

                              689c0cbde7697f43642bf1134f4b70af

                              SHA1

                              307db1c4a9570f01479dea98f6b5bd33a1deb759

                              SHA256

                              6bd7ea02b9456a3730755e76d4ee1ccc04c524e93366cd74d7f42ac628d4ec77

                              SHA512

                              13afe0797d9c2c7ab8721fbedab42225b41f45059a9167c046a11e1bf6e03ad82accaed42884dff335b66ec41d3608d0d0bd06582af51634a81550c81baff2fb

                            • C:\Users\Admin\AppData\Roaming\Oracle\lib\resources.jar

                              Filesize

                              3.4MB

                              MD5

                              181737fb6fbc7447670c89c22262199c

                              SHA1

                              11150f5ba9782d8550fd1a3d6eee889a0ca66da0

                              SHA256

                              9dafdd0afd9f6aab6eec3f130d0c85bf5507b8535b063e17c8fa4924773470b0

                              SHA512

                              8daad658207f9e8fd937254c453fb4be8b488cc061ce9e41df83fbd228193da9007feed3bb3ff12188c41a6b733d2851933d276d68d03f8edec3c3de602ca60a

                            • C:\Users\Admin\AppData\Roaming\Oracle\lib\security\blacklisted.certs

                              Filesize

                              2KB

                              MD5

                              8273f70416f494f7fa5b6c70a101e00e

                              SHA1

                              aeaebb14fbf146fbb0aaf347446c08766c86ca7f

                              SHA256

                              583500b76965eb54b03493372989ab4d3426f85462d1db232c5ae6706a4d6c58

                              SHA512

                              e697a57d64ace1f302300f83e875c2726407f8daf7c1d38b07ab8b4b11299fd698582d825bee817a1af85a285f27877a9e603e48e01c72e482a04dc7ab12c8da

                            • C:\Users\Admin\AppData\Roaming\Oracle\lib\security\java.security

                              Filesize

                              56KB

                              MD5

                              29b34fe1ee5b9329374ad1ef7587c7d2

                              SHA1

                              2fc188499d923a0fdbfa4ad93ac70699d0effaf8

                              SHA256

                              cb4819328a486176a862a35ca9ee504acb8e793bcf5ae2011e7bd89633ee6233

                              SHA512

                              45f2cfc937861863485b16f663d409890ec8d53f171cb67f356a13c2d34e7a1c8e01114dcbcc28a557a82c4cd51d2c1fcfa0570559236f5705547537a2c498a2

                            • C:\Users\Admin\AppData\Roaming\Oracle\lib\security\policy\unlimited\US_export_policy.jar

                              Filesize

                              7KB

                              MD5

                              12f971b6e65cbc7184701235469f0339

                              SHA1

                              06cb165157c5e0078b872c48707a1328b1dcba19

                              SHA256

                              84e035372ca8979bb4a387428a74942ffc7248a0e61988b7033b5b266cd187c8

                              SHA512

                              58646fc81de2e4750a3259d79a207a8cff2dc6692f178a63d92a453fc408c8d1088007ef4e93157d1017be706565716a0236039dbac848c40745a0ad89c4d0de

                            • C:\Users\Admin\AppData\Roaming\Oracle\lib\security\policy\unlimited\local_policy.jar

                              Filesize

                              7KB

                              MD5

                              109bd5e32ffeb9454bc0dd2bfdff57a7

                              SHA1

                              c3a06b4a9e24d511d6ebb5465b30083cab4a7a28

                              SHA256

                              86563bc645c5ff0e998c2bb38a75a0edb337ed188e56adf57bb51a2c5415dfef

                              SHA512

                              5a336d98c646cac2ef9499c04a29bcba55d8647d26a431dd98eb81a34cc0b29bff32dce63fc012a9b77110ba45f931911b6c674a018346916a1e12d5a6410bc1

                            • C:\Users\Admin\AppData\Roaming\hQjvokJgzD.js

                              Filesize

                              12KB

                              MD5

                              1c310834aad61fbbc58ad7c7b8f700c1

                              SHA1

                              8f40f0b4b2278051a277d711ff1f64aa86bb3fe2

                              SHA256

                              e33746095bdc06ffde270bb73db562468772152e7beaedcdcf56728c580f0ac0

                              SHA512

                              5866bff2de2408f9d6911d954615fddf868c24ca5c7c6e6599176749ddc611a041d63c9035ece66b2081375ed6c7fb4addd01ea6cb033bf8f18ac977182443bc

                            • C:\Users\Admin\AppData\Roaming\pormsuvfv.txt

                              Filesize

                              474KB

                              MD5

                              c4ca78aa92e083a80b751c6960185ec0

                              SHA1

                              cd06fa7ccb37dbfde609bfd433b3deaa59c0075f

                              SHA256

                              f5535853f61fd08b7b332eb784295b3c27b6f751cbfe1ea35dc39fc973e8c335

                              SHA512

                              3a8d98e52e1dca4e6f9ebd2652432c710ffd1f1469a77ec03f2653f8be1cd63b23c75ce5fda7c80f712178b1c396a1ff6e930d1a5d487adedac75b1dbe0380bc

                            • C:\Users\Admin\XzelmuCLxFW\ID.txt

                              Filesize

                              47B

                              MD5

                              b25efd7bf4dd043a5c8f3b8622b03049

                              SHA1

                              8d76085e8da721ed3172fef6c2c15f97d041572e

                              SHA256

                              0d27a35bbe6daf17aec41f85182e5ef6c701207d8ac24dc86a8e948c3e95d38e

                              SHA512

                              b7439bfb45f65997c5f52f7ca1e0d7ad5f7f09bef3dd71e0391d6949583d1889312b04932802dbb3ce48ef923b70e60d2be27871a9b29ee35b4b251cc6b222b8

                            • memory/2960-1087-0x000001F0B01F0000-0x000001F0B01F1000-memory.dmp

                              Filesize

                              4KB

                            • memory/2960-1156-0x000001F0B01F0000-0x000001F0B01F1000-memory.dmp

                              Filesize

                              4KB

                            • memory/2960-1163-0x000001F0B01F0000-0x000001F0B01F1000-memory.dmp

                              Filesize

                              4KB

                            • memory/2960-1093-0x000001F0B01F0000-0x000001F0B01F1000-memory.dmp

                              Filesize

                              4KB

                            • memory/2960-1157-0x000001F0B01F0000-0x000001F0B01F1000-memory.dmp

                              Filesize

                              4KB

                            • memory/2960-1134-0x000001F0B01F0000-0x000001F0B01F1000-memory.dmp

                              Filesize

                              4KB

                            • memory/2960-1116-0x000001F0B01F0000-0x000001F0B01F1000-memory.dmp

                              Filesize

                              4KB

                            • memory/2960-1038-0x000001F0B01F0000-0x000001F0B01F1000-memory.dmp

                              Filesize

                              4KB

                            • memory/3248-8-0x0000021023A80000-0x0000021023CF0000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/3248-862-0x00000210221D0000-0x00000210221D1000-memory.dmp

                              Filesize

                              4KB

                            • memory/3248-988-0x00000210221D0000-0x00000210221D1000-memory.dmp

                              Filesize

                              4KB

                            • memory/3248-340-0x00000210221D0000-0x00000210221D1000-memory.dmp

                              Filesize

                              4KB

                            • memory/3248-990-0x0000021023A80000-0x0000021023CF0000-memory.dmp

                              Filesize

                              2.4MB

                            • memory/3248-41-0x00000210221D0000-0x00000210221D1000-memory.dmp

                              Filesize

                              4KB

                            • memory/4916-948-0x000001DE4B610000-0x000001DE4B611000-memory.dmp

                              Filesize

                              4KB

                            • memory/4916-348-0x000001DE4B610000-0x000001DE4B611000-memory.dmp

                              Filesize

                              4KB

                            • memory/4916-54-0x000001DE4B610000-0x000001DE4B611000-memory.dmp

                              Filesize

                              4KB

                            • memory/4920-1114-0x000001EE3EEA0000-0x000001EE3EEA1000-memory.dmp

                              Filesize

                              4KB

                            • memory/4920-1115-0x000001EE3EEA0000-0x000001EE3EEA1000-memory.dmp

                              Filesize

                              4KB

                            • memory/4920-1094-0x000001EE3EEA0000-0x000001EE3EEA1000-memory.dmp

                              Filesize

                              4KB

                            • memory/4920-1092-0x000001EE3EEA0000-0x000001EE3EEA1000-memory.dmp

                              Filesize

                              4KB

                            • memory/4920-1136-0x000001EE3EEA0000-0x000001EE3EEA1000-memory.dmp

                              Filesize

                              4KB

                            • memory/4920-1066-0x000001EE3EEA0000-0x000001EE3EEA1000-memory.dmp

                              Filesize

                              4KB