Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2024 22:53

General

  • Target

    bf97d56c1cd112197f951653c2080814_JaffaCakes118.jar

  • Size

    748KB

  • MD5

    bf97d56c1cd112197f951653c2080814

  • SHA1

    08c28f3682b67fbc835f27e292eb4159389f62d9

  • SHA256

    1669137d9d09ee215a11a0ec6685beac90196666c1d4d0afced0f633a7c8543a

  • SHA512

    870add48eae58b1563ec98d9261ca59223c673baee1ad7f7b377506fbf00a61497c3f9531be66c4d80d692e20468056e3a55d0bc9e80a7e8bc4bfcf10ac171ed

  • SSDEEP

    12288:rJ7neJelBrH9xbLDDu7JHixkVB4Fa6QmunUy9ZExR0HJDNrFJZndtbqOTSgcDU:r9x76FCWVg5unUyjK0tzJ5Lr2RU

Malware Config

Extracted

Family

latentbot

C2

ebukaalilonu.zapto.org

Signatures

  • AdWind

    A Java-based RAT family operated as malware-as-a-service.

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • UAC bypass 3 TTPs 4 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 25 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Kills process with taskkill 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\bf97d56c1cd112197f951653c2080814_JaffaCakes118.jar
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3696
    • C:\Program Files\Java\jre-1.8\bin\java.exe
      "C:\Program Files\Java\jre-1.8\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.49754579059847862039570307093337303.class
      2⤵
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3864
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive2742884581423279117.vbs
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2868
        • C:\Windows\system32\cscript.exe
          cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive2742884581423279117.vbs
          4⤵
            PID:3776
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive4920672864056942848.vbs
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3500
          • C:\Windows\system32\cscript.exe
            cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive4920672864056942848.vbs
            4⤵
              PID:392
          • C:\Windows\SYSTEM32\cmd.exe
            cmd.exe
            3⤵
              PID:4556
          • C:\Windows\SYSTEM32\cmd.exe
            cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive8852192762977245530.vbs
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:688
            • C:\Windows\system32\cscript.exe
              cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive8852192762977245530.vbs
              3⤵
                PID:2700
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive2210651426544274538.vbs
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2504
              • C:\Windows\system32\cscript.exe
                cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive2210651426544274538.vbs
                3⤵
                  PID:620
              • C:\Windows\SYSTEM32\xcopy.exe
                xcopy "C:\Program Files\Java\jre-1.8" "C:\Users\Admin\AppData\Roaming\Oracle\" /e
                2⤵
                  PID:4368
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd.exe
                  2⤵
                    PID:444
                  • C:\Windows\SYSTEM32\reg.exe
                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GnNCJeglTwc /t REG_EXPAND_SZ /d "\"C:\Users\Admin\AppData\Roaming\Oracle\bin\javaw.exe\" -jar \"C:\Users\Admin\CznterEjPtM\KLcEJbYXJZF.hDXCEu\"" /f
                    2⤵
                    • Adds Run key to start application
                    • Modifies registry key
                    PID:3968
                  • C:\Windows\SYSTEM32\attrib.exe
                    attrib +h "C:\Users\Admin\CznterEjPtM\*.*"
                    2⤵
                    • Views/modifies file attributes
                    PID:100
                  • C:\Windows\SYSTEM32\attrib.exe
                    attrib +h "C:\Users\Admin\CznterEjPtM"
                    2⤵
                    • Views/modifies file attributes
                    PID:2240
                  • C:\Users\Admin\AppData\Roaming\Oracle\bin\javaw.exe
                    C:\Users\Admin\AppData\Roaming\Oracle\bin\javaw.exe -jar C:\Users\Admin\CznterEjPtM\KLcEJbYXJZF.hDXCEu
                    2⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:1536
                    • C:\Users\Admin\AppData\Roaming\Oracle\bin\java.exe
                      C:\Users\Admin\AppData\Roaming\Oracle\bin\java.exe -jar C:\Users\Admin\AppData\Local\Temp\_0.53617031594650493834388321626317471.class
                      3⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:408
                      • C:\Windows\SYSTEM32\cmd.exe
                        cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive8349719630656465313.vbs
                        4⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2112
                        • C:\Windows\system32\cscript.exe
                          cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive8349719630656465313.vbs
                          5⤵
                            PID:224
                        • C:\Windows\SYSTEM32\cmd.exe
                          cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive3607084019913221542.vbs
                          4⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4800
                          • C:\Windows\system32\cscript.exe
                            cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive3607084019913221542.vbs
                            5⤵
                              PID:2120
                          • C:\Windows\SYSTEM32\cmd.exe
                            cmd.exe
                            4⤵
                              PID:3024
                          • C:\Windows\SYSTEM32\cmd.exe
                            cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive4358925500423923874.vbs
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1652
                            • C:\Windows\system32\cscript.exe
                              cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive4358925500423923874.vbs
                              4⤵
                                PID:4252
                            • C:\Windows\SYSTEM32\cmd.exe
                              cmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive2990770064461585505.vbs
                              3⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3280
                              • C:\Windows\system32\cscript.exe
                                cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive2990770064461585505.vbs
                                4⤵
                                  PID:676
                              • C:\Windows\SYSTEM32\cmd.exe
                                cmd.exe
                                3⤵
                                  PID:4920
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM UserAccountControlSettings.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5012
                                • C:\Windows\SYSTEM32\cmd.exe
                                  cmd.exe /c regedit.exe /s C:\Users\Admin\AppData\Local\Temp\RVsaoKuXDN3831993446622992147.reg
                                  3⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:3628
                                  • C:\Windows\regedit.exe
                                    regedit.exe /s C:\Users\Admin\AppData\Local\Temp\RVsaoKuXDN3831993446622992147.reg
                                    4⤵
                                    • UAC bypass
                                    • Event Triggered Execution: Image File Execution Options Injection
                                    • Runs .reg file with regedit
                                    PID:2704
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM Taskmgr.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3128
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM ProcessHacker.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1788
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM procexp.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4896
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM MSASCui.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4192
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM MsMpEng.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1228
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM MpUXSrv.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1528
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM MpCmdRun.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4208
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM NisSrv.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2368
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM ConfigSecurityPolicy.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4032
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM procexp.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:676
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM wireshark.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4920
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM tshark.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3972
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM text2pcap.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3476
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM rawshark.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3412
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM mergecap.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1344
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM editcap.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1528
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM dumpcap.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1188
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM capinfos.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3280
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM mbam.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:220
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM mbamscheduler.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3968
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM mbamservice.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:860
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM AdAwareService.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3160
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM AdAwareTray.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3972
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM WebCompanion.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2956
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM AdAwareDesktop.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3912
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM V3Main.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2284
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM V3Svc.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2184
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM V3Up.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3628
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM V3SP.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3588
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM V3Proxy.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:508
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM V3Medic.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4812
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM BgScan.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3604
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM BullGuard.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4972
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM BullGuardBhvScanner.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:804
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM BullGuarScanner.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1504
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM LittleHook.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3460
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM BullGuardUpdate.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:856
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM clamscan.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4556
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM ClamTray.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:916
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM ClamWin.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3468
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM cis.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4684
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM CisTray.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4716
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM cmdagent.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:212
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM cavwp.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1872
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM dragon_updater.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4956
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM MWAGENT.EXE /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3288
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM MWASER.EXE /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4052
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM CONSCTLX.EXE /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1116
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM avpmapp.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3684
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM econceal.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4292
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM escanmon.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2432
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM escanpro.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2940
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM TRAYSSER.EXE /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3068
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM TRAYICOS.EXE /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1788
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM econser.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1140
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM VIEWTCP.EXE /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5028
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM FSHDLL64.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2588
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM fsgk32.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3288
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM fshoster32.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4384
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM FSMA32.EXE /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3964
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM fsorsp.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1488
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM fssm32.exe /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3336
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM FSM32.EXE /T /F
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:852
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM trigger.exe /T /F
                                  3⤵
                                  • Kills process with taskkill
                                  PID:916
                                • C:\Windows\SYSTEM32\taskkill.exe
                                  taskkill /IM FProtTray.exe /T /F
                                  3⤵
                                    PID:376
                                  • C:\Windows\SYSTEM32\taskkill.exe
                                    taskkill /IM FPWin.exe /T /F
                                    3⤵
                                      PID:2540
                                    • C:\Windows\SYSTEM32\taskkill.exe
                                      taskkill /IM FPAVServer.exe /T /F
                                      3⤵
                                      • Kills process with taskkill
                                      PID:3728
                                    • C:\Windows\SYSTEM32\taskkill.exe
                                      taskkill /IM AVK.exe /T /F
                                      3⤵
                                      • Kills process with taskkill
                                      PID:1128
                                    • C:\Windows\SYSTEM32\taskkill.exe
                                      taskkill /IM GdBgInx64.exe /T /F
                                      3⤵
                                      • Kills process with taskkill
                                      PID:860
                                    • C:\Windows\SYSTEM32\taskkill.exe
                                      taskkill /IM AVKProxy.exe /T /F
                                      3⤵
                                        PID:2880
                                      • C:\Windows\SYSTEM32\taskkill.exe
                                        taskkill /IM GDScan.exe /T /F
                                        3⤵
                                          PID:1308
                                        • C:\Windows\SYSTEM32\taskkill.exe
                                          taskkill /IM AVKWCtlx64.exe /T /F
                                          3⤵
                                          • Kills process with taskkill
                                          PID:4560
                                        • C:\Windows\SYSTEM32\taskkill.exe
                                          taskkill /IM AVKService.exe /T /F
                                          3⤵
                                            PID:2588
                                          • C:\Windows\SYSTEM32\taskkill.exe
                                            taskkill /IM AVKTray.exe /T /F
                                            3⤵
                                              PID:3924
                                            • C:\Windows\SYSTEM32\taskkill.exe
                                              taskkill /IM GDKBFltExe32.exe /T /F
                                              3⤵
                                              • Kills process with taskkill
                                              PID:4032
                                            • C:\Windows\SYSTEM32\taskkill.exe
                                              taskkill /IM GDSC.exe /T /F
                                              3⤵
                                                PID:4556
                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                taskkill /IM virusutilities.exe /T /F
                                                3⤵
                                                • Kills process with taskkill
                                                PID:2856
                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                taskkill /IM guardxservice.exe /T /F
                                                3⤵
                                                  PID:1328
                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                  taskkill /IM guardxkickoff_x64.exe /T /F
                                                  3⤵
                                                  • Kills process with taskkill
                                                  PID:3356
                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                  taskkill /IM iptray.exe /T /F
                                                  3⤵
                                                    PID:916
                                                  • C:\Windows\SYSTEM32\taskkill.exe
                                                    taskkill /IM freshclam.exe /T /F
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:3736
                                                  • C:\Windows\SYSTEM32\taskkill.exe
                                                    taskkill /IM freshclamwrap.exe /T /F
                                                    3⤵
                                                      PID:4732
                                                    • C:\Windows\SYSTEM32\taskkill.exe
                                                      taskkill /IM K7RTScan.exe /T /F
                                                      3⤵
                                                      • Kills process with taskkill
                                                      PID:1080
                                                    • C:\Windows\SYSTEM32\taskkill.exe
                                                      taskkill /IM K7FWSrvc.exe /T /F
                                                      3⤵
                                                        PID:3600
                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                        taskkill /IM K7PSSrvc.exe /T /F
                                                        3⤵
                                                        • Kills process with taskkill
                                                        PID:3972
                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                        taskkill /IM K7EmlPxy.EXE /T /F
                                                        3⤵
                                                          PID:4972
                                                        • C:\Windows\SYSTEM32\taskkill.exe
                                                          taskkill /IM K7TSecurity.exe /T /F
                                                          3⤵
                                                          • Kills process with taskkill
                                                          PID:3936
                                                        • C:\Windows\SYSTEM32\taskkill.exe
                                                          taskkill /IM K7AVScan.exe /T /F
                                                          3⤵
                                                            PID:3132
                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                            taskkill /IM K7CrvSvc.exe /T /F
                                                            3⤵
                                                            • Kills process with taskkill
                                                            PID:4828
                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                            taskkill /IM K7SysMon.Exe /T /F
                                                            3⤵
                                                            • Kills process with taskkill
                                                            PID:1732
                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                            taskkill /IM K7TSMain.exe /T /F
                                                            3⤵
                                                            • Kills process with taskkill
                                                            PID:4556
                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                            taskkill /IM K7TSMngr.exe /T /F
                                                            3⤵
                                                            • Kills process with taskkill
                                                            PID:2296
                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                            taskkill /IM nanosvc.exe /T /F
                                                            3⤵
                                                            • Kills process with taskkill
                                                            PID:4816
                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                            taskkill /IM nanoav.exe /T /F
                                                            3⤵
                                                            • Kills process with taskkill
                                                            PID:1712
                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                            taskkill /IM nnf.exe /T /F
                                                            3⤵
                                                            • Kills process with taskkill
                                                            PID:1044
                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                            taskkill /IM nvcsvc.exe /T /F
                                                            3⤵
                                                              PID:2536
                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                              taskkill /IM nbrowser.exe /T /F
                                                              3⤵
                                                                PID:992
                                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                                taskkill /IM nseupdatesvc.exe /T /F
                                                                3⤵
                                                                • Kills process with taskkill
                                                                PID:624
                                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                                taskkill /IM nfservice.exe /T /F
                                                                3⤵
                                                                • Kills process with taskkill
                                                                PID:1188
                                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                                taskkill /IM nwscmon.exe /T /F
                                                                3⤵
                                                                  PID:2424
                                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                                  taskkill /IM njeeves2.exe /T /F
                                                                  3⤵
                                                                    PID:2776
                                                                  • C:\Windows\SYSTEM32\taskkill.exe
                                                                    taskkill /IM nvcod.exe /T /F
                                                                    3⤵
                                                                      PID:3556
                                                                    • C:\Windows\SYSTEM32\taskkill.exe
                                                                      taskkill /IM nvoy.exe /T /F
                                                                      3⤵
                                                                        PID:1000
                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                        taskkill /IM zlhh.exe /T /F
                                                                        3⤵
                                                                          PID:884
                                                                        • C:\Windows\SYSTEM32\taskkill.exe
                                                                          taskkill /IM Zlh.exe /T /F
                                                                          3⤵
                                                                          • Kills process with taskkill
                                                                          PID:3860
                                                                        • C:\Windows\SYSTEM32\taskkill.exe
                                                                          taskkill /IM nprosec.exe /T /F
                                                                          3⤵
                                                                            PID:4272
                                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                                            taskkill /IM Zanda.exe /T /F
                                                                            3⤵
                                                                            • Kills process with taskkill
                                                                            PID:1308
                                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                                            taskkill /IM NS.exe /T /F
                                                                            3⤵
                                                                              PID:2844
                                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                                              taskkill /IM acs.exe /T /F
                                                                              3⤵
                                                                              • Kills process with taskkill
                                                                              PID:1376
                                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                                              taskkill /IM op_mon.exe /T /F
                                                                              3⤵
                                                                              • Kills process with taskkill
                                                                              PID:4384
                                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                                              taskkill /IM PSANHost.exe /T /F
                                                                              3⤵
                                                                                PID:688
                                                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                                                taskkill /IM PSUAMain.exe /T /F
                                                                                3⤵
                                                                                • Kills process with taskkill
                                                                                PID:4052
                                                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                                                taskkill /IM PSUAService.exe /T /F
                                                                                3⤵
                                                                                • Kills process with taskkill
                                                                                PID:3848
                                                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                                                taskkill /IM AgentSvc.exe /T /F
                                                                                3⤵
                                                                                • Kills process with taskkill
                                                                                PID:4984
                                                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                                                taskkill /IM BDSSVC.EXE /T /F
                                                                                3⤵
                                                                                • Kills process with taskkill
                                                                                PID:1232
                                                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                                                taskkill /IM EMLPROXY.EXE /T /F
                                                                                3⤵
                                                                                • Kills process with taskkill
                                                                                PID:444
                                                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                                                taskkill /IM OPSSVC.EXE /T /F
                                                                                3⤵
                                                                                  PID:1140
                                                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                                                  taskkill /IM ONLINENT.EXE /T /F
                                                                                  3⤵
                                                                                  • Kills process with taskkill
                                                                                  PID:5116
                                                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                                                  taskkill /IM QUHLPSVC.EXE /T /F
                                                                                  3⤵
                                                                                  • Kills process with taskkill
                                                                                  PID:2684
                                                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                                                  taskkill /IM SAPISSVC.EXE /T /F
                                                                                  3⤵
                                                                                  • Kills process with taskkill
                                                                                  PID:3032
                                                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                                                  taskkill /IM SCANNER.EXE /T /F
                                                                                  3⤵
                                                                                    PID:3288
                                                                                  • C:\Windows\SYSTEM32\taskkill.exe
                                                                                    taskkill /IM SCANWSCS.EXE /T /F
                                                                                    3⤵
                                                                                      PID:4376
                                                                                    • C:\Windows\SYSTEM32\taskkill.exe
                                                                                      taskkill /IM scproxysrv.exe /T /F
                                                                                      3⤵
                                                                                        PID:2844
                                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                                        taskkill /IM ScSecSvc.exe /T /F
                                                                                        3⤵
                                                                                          PID:4292
                                                                                        • C:\Windows\SYSTEM32\taskkill.exe
                                                                                          taskkill /IM SUPERAntiSpyware.exe /T /F
                                                                                          3⤵
                                                                                            PID:688
                                                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                                                            taskkill /IM SASCore64.exe /T /F
                                                                                            3⤵
                                                                                            • Kills process with taskkill
                                                                                            PID:4640
                                                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                                                            taskkill /IM SSUpdate64.exe /T /F
                                                                                            3⤵
                                                                                              PID:2008
                                                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                                                              taskkill /IM SUPERDelete.exe /T /F
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              PID:5052
                                                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                                                              taskkill /IM SASTask.exe /T /F
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              PID:860
                                                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                                                              taskkill /IM K7RTScan.exe /T /F
                                                                                              3⤵
                                                                                                PID:4388

                                                                                          Network

                                                                                          MITRE ATT&CK Enterprise v15

                                                                                          Replay Monitor

                                                                                          Loading Replay Monitor...

                                                                                          Downloads

                                                                                          • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

                                                                                            Filesize

                                                                                            46B

                                                                                            MD5

                                                                                            aa99ee547f4e041c0e845a6f795554c8

                                                                                            SHA1

                                                                                            bfae1cd83d7fdd74f9aa39dd80cd42f12eb4ea17

                                                                                            SHA256

                                                                                            a9310a167dfe7a99ac725efecb18a87ef57137423c50179d672261ce1ad13752

                                                                                            SHA512

                                                                                            b18ce44684b9690722bd24db001bf6c8901e99ae05aa6ce33659eac9fd8eb941f00ba69672ffdd653cacf1e963eccdc4796403a79282239870d8059342a5ca47

                                                                                          • C:\Users\Admin\AppData\Local\Temp\Retrive2210651426544274538.vbs

                                                                                            Filesize

                                                                                            281B

                                                                                            MD5

                                                                                            a32c109297ed1ca155598cd295c26611

                                                                                            SHA1

                                                                                            dc4a1fdbaad15ddd6fe22d3907c6b03727b71510

                                                                                            SHA256

                                                                                            45bfe34aa3ef932f75101246eb53d032f5e7cf6d1f5b4e495334955a255f32e7

                                                                                            SHA512

                                                                                            70372552dc86fe02ece9fe3b7721463f80be07a34126b2c75b41e30078cda9e90744c7d644df623f63d4fb985482e345b3351c4d3da873162152c67fc6ecc887

                                                                                          • C:\Users\Admin\AppData\Local\Temp\Retrive8852192762977245530.vbs

                                                                                            Filesize

                                                                                            276B

                                                                                            MD5

                                                                                            3bdfd33017806b85949b6faa7d4b98e4

                                                                                            SHA1

                                                                                            f92844fee69ef98db6e68931adfaa9a0a0f8ce66

                                                                                            SHA256

                                                                                            9da575dd2d5b7c1e9bab8b51a16cde457b3371c6dcdb0537356cf1497fa868f6

                                                                                            SHA512

                                                                                            ae5e5686ae71edef53e71cd842cb6799e4383b9c238a5c361b81647efa128d2fedf3bf464997771b5b0c47a058fecae7829aeedcd098c80a11008581e5781429

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_0.49754579059847862039570307093337303.class

                                                                                            Filesize

                                                                                            241KB

                                                                                            MD5

                                                                                            781fb531354d6f291f1ccab48da6d39f

                                                                                            SHA1

                                                                                            9ce4518ebcb5be6d1f0b5477fa00c26860fe9a68

                                                                                            SHA256

                                                                                            97d585b6aff62fb4e43e7e6a5f816dcd7a14be11a88b109a9ba9e8cd4c456eb9

                                                                                            SHA512

                                                                                            3e6630f5feb4a3eb1dac7e9125ce14b1a2a45d7415cf44cea42bc51b2a9aa37169ee4a4c36c888c8f2696e7d6e298e2ad7b2f4c22868aaa5948210eb7db220d8

                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302416131-1437503476-2806442725-1000\83aa4cc77f591dfc2374580bbd95f6ba_acd03e19-89e2-40d7-b0f4-25b8a05635ee

                                                                                            Filesize

                                                                                            45B

                                                                                            MD5

                                                                                            c8366ae350e7019aefc9d1e6e6a498c6

                                                                                            SHA1

                                                                                            5731d8a3e6568a5f2dfbbc87e3db9637df280b61

                                                                                            SHA256

                                                                                            11e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238

                                                                                            SHA512

                                                                                            33c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\bin\java.dll

                                                                                            Filesize

                                                                                            162KB

                                                                                            MD5

                                                                                            4e6dfd5867f4cea96dad1d59a0ca43fe

                                                                                            SHA1

                                                                                            6a08abc0b5a2cab00eb6d7543c661aa6620890a1

                                                                                            SHA256

                                                                                            179df744661b659d50fd6943834d81476287c2075448d2dc783fb32c69a00e54

                                                                                            SHA512

                                                                                            2565197c75eca66600a530aa6b033d4985fcb05edf73e096ebba37f06016e6ae5c4fc516a182bf674ff18e3f3b031353c9ff187a6b8804058b5d2b47c914e60b

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\bin\java.exe

                                                                                            Filesize

                                                                                            285KB

                                                                                            MD5

                                                                                            dafb5fbb0614c19eccdab9bef8f89c22

                                                                                            SHA1

                                                                                            91ab91eb4a90f02c4950c3e5da80f3eb24bddb52

                                                                                            SHA256

                                                                                            af62c3850cd7a84db64bbaf68533e2769da619a8a4bccf0ac4836d2ec86e4b5e

                                                                                            SHA512

                                                                                            81cf8e04b595052e67db73454a67e2098e1df9353e2c3cc842b8ab2a9fa837b90a2101d5a097a6b0af0030869e788de1aa73ebb958f1428a3952ce0464db3e93

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\bin\javaw.exe

                                                                                            Filesize

                                                                                            285KB

                                                                                            MD5

                                                                                            7fb44c5bca4226d8aab7398e836807a2

                                                                                            SHA1

                                                                                            47128e4f8afabfde5037ed0fcaba8752c528ff52

                                                                                            SHA256

                                                                                            a64ead73c06470bc5c84cfc231b0723d70d29fec7d385a268be2c590dc5eb1ef

                                                                                            SHA512

                                                                                            f0bd093f054c99bcc50df4005d0190bd7e3dcefea7008ae4c9b67a29e832e02ae9ff39fa75bc1352c127aeb13afdea9bfdcc238ac826ef17f288d6fbd2ec8cab

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\bin\net.dll

                                                                                            Filesize

                                                                                            104KB

                                                                                            MD5

                                                                                            6c720917e5c8ce1202a4141e8c8cfaf7

                                                                                            SHA1

                                                                                            1175d918134983d1d64a42047f4ff814054123de

                                                                                            SHA256

                                                                                            833cdbd7b221dda58ba728ee9a41cac1d6819d19bfc7336a4b86cc69a5af3695

                                                                                            SHA512

                                                                                            217f824b389547993556c26069d58eb956e87029b5c58556c2d308e48a0db2a02a057b3147fcf6ac7606f2b97ada33e2372112e93944f645137d81cc0dd32a9d

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\bin\nio.dll

                                                                                            Filesize

                                                                                            66KB

                                                                                            MD5

                                                                                            d8a6b5e5a33cb71b61964be369526704

                                                                                            SHA1

                                                                                            7788adf9163fb2ac2c85c43630c0998b0f13360a

                                                                                            SHA256

                                                                                            686021b000cd6d76b97c6f924c528293bc55dfb4ce936cfe70959eecd1665c90

                                                                                            SHA512

                                                                                            d15e5832d025a8fb17dd48b8c6d8246b93d54543ba52d40a9f97aff257847f7e05971ae927a77e12ab1625dc514a29115ce5fe9ddad18fe5fc4b0ddc2f8ca6d1

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\bin\plugin2\msvcp140.dll

                                                                                            Filesize

                                                                                            558KB

                                                                                            MD5

                                                                                            bf78c15068d6671693dfcdfa5770d705

                                                                                            SHA1

                                                                                            4418c03c3161706a4349dfe3f97278e7a5d8962a

                                                                                            SHA256

                                                                                            a88b8c1c8f27bf90fe960e0e8bd56984ad48167071af92d96ec1051f89f827fb

                                                                                            SHA512

                                                                                            5b6b0ab4e82cc979eaa619d387c6995198fd19aa0c455bef44bd37a765685575d57448b3b4accd70d3bd20a6cd408b1f518eda0f6dae5aa106f225bee8291372

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\bin\plugin2\vcruntime140.dll

                                                                                            Filesize

                                                                                            95KB

                                                                                            MD5

                                                                                            7415c1cc63a0c46983e2a32581daefee

                                                                                            SHA1

                                                                                            5f8534d79c84ac45ad09b5a702c8c5c288eae240

                                                                                            SHA256

                                                                                            475ab98b7722e965bd38c8fa6ed23502309582ccf294ff1061cb290c7988f0d1

                                                                                            SHA512

                                                                                            3d4b24061f72c0e957c7b04a0c4098c94c8f1afb4a7e159850b9939c7210d73398be6f27b5ab85073b4e8c999816e7804fef0f6115c39cd061f4aaeb4dcda8cf

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\bin\plugin2\vcruntime140_1.dll

                                                                                            Filesize

                                                                                            36KB

                                                                                            MD5

                                                                                            fcda37abd3d9e9d8170cd1cd15bf9d3f

                                                                                            SHA1

                                                                                            b23ff3e9aa2287b9c1249a008c0ae06dc8b6fdf2

                                                                                            SHA256

                                                                                            0579d460ea1f7e8a815fa55a8821a5ff489c8097f051765e9beaf25d8d0f27d6

                                                                                            SHA512

                                                                                            de8be61499aaa1504dde8c19666844550c2ea7ef774ecbe26900834b252887da31d4cf4fb51338b16b6a4416de733e519ebf8c375eb03eb425232a6349da2257

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\bin\server\jvm.dll

                                                                                            Filesize

                                                                                            8.5MB

                                                                                            MD5

                                                                                            dceeb4fb6af9bb2ea7a2eed1d921afb5

                                                                                            SHA1

                                                                                            af1463a499f7d6eed5efcb9c9515e82335e9c1b6

                                                                                            SHA256

                                                                                            6707043f0b609a0b3677cd11f6526d8ecfcbeab079a394019d648c9039e7da21

                                                                                            SHA512

                                                                                            e4688d2264dda88e90beeb394adc48064012ed458ab9015ecef744a86ab76b4f65845f77a3d02b131aa5c342e6a572f79f471b5dc8df178b2d7483c04b1f4763

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\bin\sunec.dll

                                                                                            Filesize

                                                                                            142KB

                                                                                            MD5

                                                                                            2632b6d90868ff1ece67f76b86a23d79

                                                                                            SHA1

                                                                                            90ddedde02a4cc37ae361caabc36a6a686c24bd1

                                                                                            SHA256

                                                                                            86106645d9e3801911808d6343a7fead7b6e9d8b740bad63a4cd9851ff599283

                                                                                            SHA512

                                                                                            61e0581c3dde45db74383b93e56396c65435714e746fe4f000c53465e8e6750bd787b5895a987bbdbe4badb5ad3570394c82476c2b4d65099f0b923002153b18

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\bin\sunmscapi.dll

                                                                                            Filesize

                                                                                            45KB

                                                                                            MD5

                                                                                            23e39ae344f134e975cb82c075440469

                                                                                            SHA1

                                                                                            373b48423dca5efb6ef31bca0e6b24b7d6889c7f

                                                                                            SHA256

                                                                                            f45ed3574aac7fc1411ee3c1e0f5711636ba37720d4d0cdfc58c439501c2b691

                                                                                            SHA512

                                                                                            9dcdb4b4622d590226ac1b5ed19c93376148dcdca394a28d08e97cc84bf298508805c14d41a3ad3ec2cf6a370a227b0dab230c6a8f075d35e5be604928f569d8

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\bin\verify.dll

                                                                                            Filesize

                                                                                            55KB

                                                                                            MD5

                                                                                            82bb3a2292372acbf8bb25e30a3e169c

                                                                                            SHA1

                                                                                            c09c134561213cd67c670f60a2c52cf947e51a74

                                                                                            SHA256

                                                                                            9c99e6591c73eda0dfd6bb9a55d0a175cf5bdb583115477cedc627fd793c3deb

                                                                                            SHA512

                                                                                            db4802fe0e3a6dc1678765af559e9c1f6e8639dd5c7c8f18f08296b1b4d15cfe748e391459253a3dde0ca2bda74c6772af262e5b194c78c6bdefbcc2c5377db7

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\bin\zip.dll

                                                                                            Filesize

                                                                                            87KB

                                                                                            MD5

                                                                                            0d56a7ff632826362768b3edd5e5174f

                                                                                            SHA1

                                                                                            8b96856f8fe3175039d1a7cf3ac0910467844a08

                                                                                            SHA256

                                                                                            27cf17beab60d7f9a62aac7622eefa06eee78796db585f9ae5d3a5b5022d56a9

                                                                                            SHA512

                                                                                            b4fe51874b9ba7a2325ae3c0b96f32065f7cee7c846a9028495070f1f91cedd9445cb91248acd1ec134a72b2c07e49afcaef01b58af1dfb0ff417033c2d0e595

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\amd64\jvm.cfg

                                                                                            Filesize

                                                                                            634B

                                                                                            MD5

                                                                                            499f2a4e0a25a41c1ff80df2d073e4fd

                                                                                            SHA1

                                                                                            e2469cbe07e92d817637be4e889ebb74c3c46253

                                                                                            SHA256

                                                                                            80847ed146dbc5a9f604b07ec887737fc266699abba266177b553149487ce9eb

                                                                                            SHA512

                                                                                            7828f7b06d0f4309b9edd3aa71ae0bb7ee92d2f8df5642c13437bba2a3888e457dc9b24c16aa9e0f19231530cb44b8ccd955cbbdf5956ce8622cc208796b357d

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\charsets.jar

                                                                                            Filesize

                                                                                            2.9MB

                                                                                            MD5

                                                                                            bfdb22624544f02100cd37cff954f64c

                                                                                            SHA1

                                                                                            f699b290845f487cb7050d41a83b85446ea202b1

                                                                                            SHA256

                                                                                            04a6bc7af4d41fda5ca6c7584df50c5d0881fada89b4788e8ee4e5919345f143

                                                                                            SHA512

                                                                                            70c5f501c5e1cc67341bb3f4d190179a79fb8bee7292ff8cca0749368ae4475387ce121e8d33adc7e4e6fad5a10eab378fff17e3da0422d4cca0837c95574b95

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\deploy\messages_zh_TW.properties

                                                                                            Filesize

                                                                                            3KB

                                                                                            MD5

                                                                                            880baacb176553deab39edbe4b74380d

                                                                                            SHA1

                                                                                            37a57aad121c14c25e149206179728fa62203bf0

                                                                                            SHA256

                                                                                            ff4a3a92bc92cb08d2c32c435810440fd264edd63e56efa39430e0240c835620

                                                                                            SHA512

                                                                                            3039315bb283198af9090bd3d31cfae68ee73bc2b118bbae0b32812d4e3fd0f11ce962068d4a17b065dab9a66ef651b9cb8404c0a2defce74bb6b2d1d93646d5

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\ext\cldrdata.jar

                                                                                            Filesize

                                                                                            3.7MB

                                                                                            MD5

                                                                                            70e2863360b8d18351dd3c39a250d914

                                                                                            SHA1

                                                                                            fde3da8edd59fbbd3c503c220a9c4ecddaebc73b

                                                                                            SHA256

                                                                                            09fe9eb2266ec445fb179919befee6c95d362e5e19db20fa10499f1e289a56f8

                                                                                            SHA512

                                                                                            829e794de8ddda0ff4c4c58522efe4200265aa903e67de2fc3be98e5cde4bf7316f582dbe52aafec5816689f42ca9319306e387f400bc7004b5612fd4006e013

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\ext\localedata.jar

                                                                                            Filesize

                                                                                            2.1MB

                                                                                            MD5

                                                                                            5e8abf5d3c3822c003f0db394aed37a6

                                                                                            SHA1

                                                                                            79446138608c310113032da15b61f9b06af26c2c

                                                                                            SHA256

                                                                                            aa32ea126282ef03e72a3427055b99c0c3e6fc836caea64a75c8b5cf5886ca0a

                                                                                            SHA512

                                                                                            d4fc84503e8048bb0617cc59fb327b392793f5e6bed7ab17bafdbcc11f22e3d6b3f4932a6d98f4be56991a8ac29c6237a57b78a2174f6839c005520866b7e0d1

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\ext\meta-index

                                                                                            Filesize

                                                                                            1KB

                                                                                            MD5

                                                                                            005faac2118450bfcd46ae414da5f0e5

                                                                                            SHA1

                                                                                            9f5c887e0505e1bb06bd1fc7975a3219709d061d

                                                                                            SHA256

                                                                                            f0bce718f8d2b38247ce0ac814a1470c826602f4251d86369c2359ff60676bd8

                                                                                            SHA512

                                                                                            8b618c74b359ab3c9d3c8a4864f8e48fe4054514a396352a829a84c9b843a2028c6c31eb53e857e03c803294e05f69c5bf586e261312264e7607b2efd14f78a9

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\ext\nashorn.jar

                                                                                            Filesize

                                                                                            1.9MB

                                                                                            MD5

                                                                                            4f866fb96b417ed462d611e8e69ed16f

                                                                                            SHA1

                                                                                            cc9b5a73c8ec0aff68b77a9eac14248b9ced8fca

                                                                                            SHA256

                                                                                            ba96eeb100a78ffa2532eb9312f94041d39e468bdc6e69c096da7512ed420ba6

                                                                                            SHA512

                                                                                            876c4d0fbe10d6ce98fdd7ed181daeab0b16ea7f0c6e292f3319a995cb77ad3a6b6de5ff8bfd7a5dca55ad9b520670cf974e7d386347e121e5ad343fc5a61c82

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\ext\sunec.jar

                                                                                            Filesize

                                                                                            46KB

                                                                                            MD5

                                                                                            1227482c65dc231e3607b002950f5497

                                                                                            SHA1

                                                                                            709ff3738d5da8db225818df2966f04c13cb7d02

                                                                                            SHA256

                                                                                            cfe84c5292f9ddef96fecf118377565bbaf769eee7ff4cca81652fe1134f9809

                                                                                            SHA512

                                                                                            87c4f5fa1e6dad6f2fab8a0371380fa7be9f63b05f8ff6740a4208ec115f8db9c512de9e40b4b853be35effed2804d0774c0e9426571a129cb6bdecd527cdb8c

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\ext\sunjce_provider.jar

                                                                                            Filesize

                                                                                            287KB

                                                                                            MD5

                                                                                            456031723ebc7270d9bc3747cdd6daa2

                                                                                            SHA1

                                                                                            a4a61bb10ac83f201854a11750aa86e7dc8da41b

                                                                                            SHA256

                                                                                            324499cedd3f19ea621a38f42834369d7da8bdf40fcb5a345007bfa2e5987780

                                                                                            SHA512

                                                                                            b425eabd590f905aa147720aa507a0da2b31199956f21137a722fe6c8de05549d1cddbb2fb2ea1cbe34e39ce9d0eabb0502dd2a9a09f72dd87cd002765537079

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\ext\sunmscapi.jar

                                                                                            Filesize

                                                                                            48KB

                                                                                            MD5

                                                                                            35f7968a28732e702ce7e1074bbc46ed

                                                                                            SHA1

                                                                                            a09992ff24238d7e5925bd2f8dc01ec8a44f78f0

                                                                                            SHA256

                                                                                            2e42b9055905b163e7fb487845ac80627c9a9a5fdf9dd7c7983c52437e1d3375

                                                                                            SHA512

                                                                                            f56e1449b7765d031831eb85b85ada1d0e468ba92e1e0bd48c065eee7d3c97ef04e1f947773f18b0f6d41994530790aafac2ef85289685fe19a795ec62f8bd27

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\images\cursors\win32_CopyNoDrop32x32.gif

                                                                                            Filesize

                                                                                            153B

                                                                                            MD5

                                                                                            1e9d8f133a442da6b0c74d49bc84a341

                                                                                            SHA1

                                                                                            259edc45b4569427e8319895a444f4295d54348f

                                                                                            SHA256

                                                                                            1a1d3079d49583837662b84e11d8c0870698511d9110e710eb8e7eb20df7ae3b

                                                                                            SHA512

                                                                                            63d6f70c8cab9735f0f857f5bf99e319f6ae98238dc7829dd706b7d6855c70be206e32e3e55df884402483cf8bebad00d139283af5c0b85dc1c5bf8f253acd37

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\jce.jar

                                                                                            Filesize

                                                                                            119KB

                                                                                            MD5

                                                                                            e0b7e0f36b9fc43d13403145db82e758

                                                                                            SHA1

                                                                                            def42078cfa315e98393c69963efb4e35e2e28a8

                                                                                            SHA256

                                                                                            4362c179bb78107777d6a0557693e65eb2b318c26642162f89509dfdab8c97fe

                                                                                            SHA512

                                                                                            5074a7ceb9621096f3bbf419d32ac260ea6d9d09c758544c2761121026c2b9db0b6617806d3b692347b685d541123f4eda99dcbaa29d9c9a2d740b22c44bf7bb

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\jfr.jar

                                                                                            Filesize

                                                                                            560KB

                                                                                            MD5

                                                                                            530b1ee313390d5d51ae8f5aa0be9070

                                                                                            SHA1

                                                                                            d5de5ee8bd7275b5b20f466ba0869251679b24b3

                                                                                            SHA256

                                                                                            bded3bbadd255c856ed7fb9900cbf0445e980a669a3aa043cf095e18539eb48f

                                                                                            SHA512

                                                                                            50671ca7de240c38921849304ae482a52ae481d0ff5a2f02aef90c20b9f49842bf2ea32b9caabde57a955b8d638a017b6b3cdd662b679a2d743e029f97b88937

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\jsse.jar

                                                                                            Filesize

                                                                                            1.7MB

                                                                                            MD5

                                                                                            01408480f5c65da8c74ecfde0eed1a72

                                                                                            SHA1

                                                                                            2f1cb5df6d4879de8b0827d160e9bb281f829a3a

                                                                                            SHA256

                                                                                            fffafe7e2bacef79280a4565b5d1075320a8ec38dff7978c8fe6c033b6df49d0

                                                                                            SHA512

                                                                                            ae585f4825073da19f611bb7d11a1d075b4998bc3f7d53a67cdba778e0729e0b5134ce8fc49897f67d39e46f1209524ab53ab4551defc6a4127012e332f15d61

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\logging.properties

                                                                                            Filesize

                                                                                            2KB

                                                                                            MD5

                                                                                            809c50033f825eff7fc70419aaf30317

                                                                                            SHA1

                                                                                            89da8094484891f9ec1fa40c6c8b61f94c5869d0

                                                                                            SHA256

                                                                                            ce1688fe641099954572ea856953035b5188e2ca228705001368250337b9b232

                                                                                            SHA512

                                                                                            c5aa71ad9e1d17472644eb43146edf87caa7bccf0a39e102e31e6c081cd017e01b39645f55ee87f4ea3556376f7cad3953ce3f3301b4b3af265b7b4357b67a5c

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\meta-index

                                                                                            Filesize

                                                                                            2KB

                                                                                            MD5

                                                                                            91aa6ea7320140f30379f758d626e59d

                                                                                            SHA1

                                                                                            3be2febe28723b1033ccdaa110eaf59bbd6d1f96

                                                                                            SHA256

                                                                                            4af21954cdf398d1eae795b6886ca2581dac9f2f1d41c98c6ed9b5dbc3e3c1d4

                                                                                            SHA512

                                                                                            03428803f1d644d89eb4c0dcbdea93acaac366d35fc1356ccabf83473f4fef7924edb771e44c721103cec22d94a179f092d1bfd1c0a62130f076eb82a826d7cb

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\net.properties

                                                                                            Filesize

                                                                                            5KB

                                                                                            MD5

                                                                                            8bc6628d01bad30798440cc00f638165

                                                                                            SHA1

                                                                                            fd9471742eb759f4478bb1de9a0dc0527265b6ea

                                                                                            SHA256

                                                                                            31ce7ce29c66a1696a985a197195b5e051b2c243ea83e9d1de614f0c4b4f7530

                                                                                            SHA512

                                                                                            8da3439774a07a6309f985d1a29dda5383975bbdf6b8e2809bab69a2c44f65d3de2a546231ed6e183864193f834c9a7042fdcc4ee10181d0bd3891363032c242

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\resources.jar

                                                                                            Filesize

                                                                                            3.4MB

                                                                                            MD5

                                                                                            c5152884c2676dd45109cfeba088a549

                                                                                            SHA1

                                                                                            8fe4fd1980bdc4139491b0dd963eb830b70bb8d6

                                                                                            SHA256

                                                                                            65a6d0d74b193af857dd5252d59e8bf9214ddb360b26c1da816b029bf0cf208c

                                                                                            SHA512

                                                                                            ed8d4777609024960a7037f42937de41c434df4ff7062b43f03f0060e326bdef7917e941c9d3db5a8ec7a65f4890ef3dd53c87401f9568e6f068f2930d558e61

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\security\blacklisted.certs

                                                                                            Filesize

                                                                                            2KB

                                                                                            MD5

                                                                                            8273f70416f494f7fa5b6c70a101e00e

                                                                                            SHA1

                                                                                            aeaebb14fbf146fbb0aaf347446c08766c86ca7f

                                                                                            SHA256

                                                                                            583500b76965eb54b03493372989ab4d3426f85462d1db232c5ae6706a4d6c58

                                                                                            SHA512

                                                                                            e697a57d64ace1f302300f83e875c2726407f8daf7c1d38b07ab8b4b11299fd698582d825bee817a1af85a285f27877a9e603e48e01c72e482a04dc7ab12c8da

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\security\cacerts

                                                                                            Filesize

                                                                                            109KB

                                                                                            MD5

                                                                                            25091c226f74b16353aecb8c982cb075

                                                                                            SHA1

                                                                                            90712b8f8dd4d651973fa0cf91a4ba7ff9bbeb64

                                                                                            SHA256

                                                                                            878ae02bf6f6723b034ef7b826e7d17a31f266cab1bfe088080d8ad2ad167c75

                                                                                            SHA512

                                                                                            4fecd5a4e3f246becef9eb8de6d357e85d71e6b8506c4e96e3083adae6aa24b2de3ed87321bd2f1cad15c8411c4d2eb254acea119ce78b9ab561cc9bc783f23d

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\security\java.security

                                                                                            Filesize

                                                                                            55KB

                                                                                            MD5

                                                                                            8f0e3440fffdbcaa9d26be4730492a66

                                                                                            SHA1

                                                                                            20a3e5a8ecbec20d41d7124120d264f61de96613

                                                                                            SHA256

                                                                                            b5e8205764b83f46b50187b2021de7c86a890df908a8d6c17275a68924f832c6

                                                                                            SHA512

                                                                                            c04528769ce780e730ef71803ca8191c217f571f62703daca273499b90e93101383a3699263458c205cd7a8733399c3c2ca6afc85b6843c2c5e2ba0890e762cb

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\security\policy\unlimited\US_export_policy.jar

                                                                                            Filesize

                                                                                            3KB

                                                                                            MD5

                                                                                            6cbca5808b4a8613d2fed6fe4a84c449

                                                                                            SHA1

                                                                                            0135b30ebec03fb69d79cdc3126e608d9effb8b2

                                                                                            SHA256

                                                                                            761aab2969883e9e5ea76df63ca404fb67673efc3f97def057f8e22517fc9518

                                                                                            SHA512

                                                                                            4d9bf052aa124d07673c601cbfb83223b87369f7be7575a13e13c0d893e57849ba11e430b7769901782c26471528dfaa130996916451e1a7e38cf28468e44cfa

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\security\policy\unlimited\local_policy.jar

                                                                                            Filesize

                                                                                            3KB

                                                                                            MD5

                                                                                            360663f26c5584e6c6127254b261fa0c

                                                                                            SHA1

                                                                                            aee6515eede2ad7c697ba8a61bdd9359be3319d2

                                                                                            SHA256

                                                                                            02f69a433405ea928c89a8aade74e5462282ccb9a9d30851312ed3459398f85c

                                                                                            SHA512

                                                                                            e3920d5abbbe6b0e3029ed1e0b2ce1a53da6c7e728f635b12f00b1fd2eb6151fff74b9dc85ec0c0920f7fda440c1604d24ca766cdbcb78be3425088d97e00208

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\tzdb.dat

                                                                                            Filesize

                                                                                            101KB

                                                                                            MD5

                                                                                            53657d061c8233bde2dc4d98918d7f89

                                                                                            SHA1

                                                                                            fe5e2734aa810c3212a5078996deb357137b61f0

                                                                                            SHA256

                                                                                            612bade1c96fd5658fc1d881405381b99124d4f548a1604ac7a869235e6f819d

                                                                                            SHA512

                                                                                            0fe2756fe720e207cc4cc3d9c82be8da96568111e79f68fef47e58a874af4a3c4b7b50745b5763a52f11e6bfc57e1043098c2156356e36b18345dbe70fa7b75a

                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\lib\tzmappings

                                                                                            Filesize

                                                                                            9KB

                                                                                            MD5

                                                                                            62bc9fa21191d34f1db3ed7ad5106efa

                                                                                            SHA1

                                                                                            750cc36b35487d6054e039469039aece3a0cc9e9

                                                                                            SHA256

                                                                                            83755efbcb24476f61b7b57bcf54707161678431347e5de2d7b894d022a0089a

                                                                                            SHA512

                                                                                            af0ddb1bc2e9838b8f37dc196d26024126ac989f5b632cb2a8efdc29fbce289b4d0bac587fe23f17dfb6905ceada8d07b18508db78f226b15b15900738f581a3

                                                                                          • C:\Users\Admin\CznterEjPtM\ID.txt

                                                                                            Filesize

                                                                                            47B

                                                                                            MD5

                                                                                            95669c23206aeca4cae77a510543345b

                                                                                            SHA1

                                                                                            e69a70f78bc2b7739870a837566d701a89c448d4

                                                                                            SHA256

                                                                                            e30337230e5541aeb2b927d38fc94fcbd66eb32300cb398663dcd0ec04ff9e55

                                                                                            SHA512

                                                                                            944d6e4ce0b691f6e4b6bf9be8fccdf871bccad7f56af5b525269a1188215220ed3c720e3224344dcddc253a3f593129825c947ed9a5f545841424bbb4bccad4

                                                                                          • C:\Users\Admin\CznterEjPtM\KLcEJbYXJZF.hDXCEu

                                                                                            Filesize

                                                                                            748KB

                                                                                            MD5

                                                                                            bf97d56c1cd112197f951653c2080814

                                                                                            SHA1

                                                                                            08c28f3682b67fbc835f27e292eb4159389f62d9

                                                                                            SHA256

                                                                                            1669137d9d09ee215a11a0ec6685beac90196666c1d4d0afced0f633a7c8543a

                                                                                            SHA512

                                                                                            870add48eae58b1563ec98d9261ca59223c673baee1ad7f7b377506fbf00a61497c3f9531be66c4d80d692e20468056e3a55d0bc9e80a7e8bc4bfcf10ac171ed

                                                                                          • C:\Windows\System32\test.txt

                                                                                            MD5

                                                                                            d41d8cd98f00b204e9800998ecf8427e

                                                                                            SHA1

                                                                                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                            SHA256

                                                                                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                            SHA512

                                                                                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                          • memory/3696-68-0x0000027D0ADD0000-0x0000027D0ADE0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-85-0x0000027D0AEE0000-0x0000027D0AEF0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-87-0x0000027D0AE50000-0x0000027D0AE60000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-88-0x0000027D0AEF0000-0x0000027D0AF00000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-91-0x0000027D0AF00000-0x0000027D0AF10000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-90-0x0000027D0AE60000-0x0000027D0AE70000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-95-0x0000027D0AF10000-0x0000027D0AF20000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-94-0x0000027D0AE70000-0x0000027D0AE80000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-96-0x0000027D0AE80000-0x0000027D0AE90000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-97-0x0000027D0AF20000-0x0000027D0AF30000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-103-0x0000027D0AEA0000-0x0000027D0AEB0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-102-0x0000027D0AF40000-0x0000027D0AF50000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-101-0x0000027D0AF30000-0x0000027D0AF40000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-100-0x0000027D0AE90000-0x0000027D0AEA0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-107-0x0000027D0AF50000-0x0000027D0AF60000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-106-0x0000027D0AEB0000-0x0000027D0AEC0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-109-0x0000027D0AEC0000-0x0000027D0AED0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-110-0x0000027D0AF60000-0x0000027D0AF70000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-114-0x0000027D0AED0000-0x0000027D0AEE0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-115-0x0000027D0AF70000-0x0000027D0AF80000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-117-0x0000027D0AEE0000-0x0000027D0AEF0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-118-0x0000027D0AF80000-0x0000027D0AF90000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-121-0x0000027D0AF90000-0x0000027D0AFA0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-120-0x0000027D0AEF0000-0x0000027D0AF00000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-127-0x0000027D0AFA0000-0x0000027D0AFB0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-129-0x0000027D0AF10000-0x0000027D0AF20000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-128-0x0000027D0AFB0000-0x0000027D0AFC0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-130-0x0000027D0AF20000-0x0000027D0AF30000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-131-0x0000027D0AFC0000-0x0000027D0AFD0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-125-0x0000027D0AF00000-0x0000027D0AF10000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-134-0x0000027D0AF30000-0x0000027D0AF40000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-136-0x0000027D0AFD0000-0x0000027D0AFE0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-135-0x0000027D0AF40000-0x0000027D0AF50000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-137-0x0000027D0AFE0000-0x0000027D0AFF0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-146-0x0000027D0AF60000-0x0000027D0AF70000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-145-0x0000027D0B010000-0x0000027D0B020000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-149-0x0000027D0B020000-0x0000027D0B030000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-148-0x0000027D0AF70000-0x0000027D0AF80000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-144-0x0000027D0B000000-0x0000027D0B010000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-143-0x0000027D0AFF0000-0x0000027D0B000000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-142-0x0000027D0AF50000-0x0000027D0AF60000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-151-0x0000027D0AF80000-0x0000027D0AF90000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-152-0x0000027D0B030000-0x0000027D0B040000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-159-0x0000027D0AFB0000-0x0000027D0AFC0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-161-0x0000027D0B060000-0x0000027D0B070000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-160-0x0000027D0B050000-0x0000027D0B060000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-158-0x0000027D0AFA0000-0x0000027D0AFB0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-156-0x0000027D0B040000-0x0000027D0B050000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-155-0x0000027D0AF90000-0x0000027D0AFA0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-164-0x0000027D0AFC0000-0x0000027D0AFD0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-167-0x0000027D0B080000-0x0000027D0B090000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-165-0x0000027D0B070000-0x0000027D0B080000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-262-0x0000027D09070000-0x0000027D09071000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3696-84-0x0000027D0AE40000-0x0000027D0AE50000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-292-0x0000027D09070000-0x0000027D09071000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3696-81-0x0000027D0AE30000-0x0000027D0AE40000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-334-0x0000027D09070000-0x0000027D09071000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3696-331-0x0000027D09070000-0x0000027D09071000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3696-353-0x0000027D09070000-0x0000027D09071000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3696-357-0x0000027D09070000-0x0000027D09071000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3696-356-0x0000027D09070000-0x0000027D09071000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3696-82-0x0000027D0AED0000-0x0000027D0AEE0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-79-0x0000027D0AEC0000-0x0000027D0AED0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-74-0x0000027D0AE00000-0x0000027D0AE10000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-75-0x0000027D0AE10000-0x0000027D0AE20000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-76-0x0000027D0AE20000-0x0000027D0AE30000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-77-0x0000027D0AEB0000-0x0000027D0AEC0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-67-0x0000027D0ADC0000-0x0000027D0ADD0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-2-0x0000027D0AAD0000-0x0000027D0AD40000-memory.dmp

                                                                                            Filesize

                                                                                            2.4MB

                                                                                          • memory/3696-69-0x0000027D0ADE0000-0x0000027D0ADF0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-70-0x0000027D0ADF0000-0x0000027D0AE00000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-71-0x0000027D0AE90000-0x0000027D0AEA0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-72-0x0000027D0AEA0000-0x0000027D0AEB0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-64-0x0000027D0AE80000-0x0000027D0AE90000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-63-0x0000027D0ADB0000-0x0000027D0ADC0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-62-0x0000027D0AE70000-0x0000027D0AE80000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-61-0x0000027D0ADA0000-0x0000027D0ADB0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-58-0x0000027D0AE60000-0x0000027D0AE70000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-55-0x0000027D09070000-0x0000027D09071000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3696-52-0x0000027D0AD80000-0x0000027D0AD90000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-53-0x0000027D0AD90000-0x0000027D0ADA0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-54-0x0000027D0AE50000-0x0000027D0AE60000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-49-0x0000027D0AD70000-0x0000027D0AD80000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-50-0x0000027D0AE40000-0x0000027D0AE50000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-47-0x0000027D09070000-0x0000027D09071000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3696-46-0x0000027D0AE30000-0x0000027D0AE40000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-32-0x0000027D0ADC0000-0x0000027D0ADD0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-38-0x0000027D0AAD0000-0x0000027D0AD40000-memory.dmp

                                                                                            Filesize

                                                                                            2.4MB

                                                                                          • memory/3696-39-0x0000027D0AE00000-0x0000027D0AE10000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-40-0x0000027D0AE10000-0x0000027D0AE20000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-41-0x0000027D0AE20000-0x0000027D0AE30000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-42-0x0000027D0AD40000-0x0000027D0AD50000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-43-0x0000027D0AD50000-0x0000027D0AD60000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-44-0x0000027D0AD60000-0x0000027D0AD70000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-34-0x0000027D0ADE0000-0x0000027D0ADF0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-35-0x0000027D0ADF0000-0x0000027D0AE00000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-33-0x0000027D0ADD0000-0x0000027D0ADE0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-26-0x0000027D0ADB0000-0x0000027D0ADC0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-24-0x0000027D0ADA0000-0x0000027D0ADB0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-21-0x0000027D0AD80000-0x0000027D0AD90000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-22-0x0000027D0AD90000-0x0000027D0ADA0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-18-0x0000027D0AD70000-0x0000027D0AD80000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-14-0x0000027D0AD40000-0x0000027D0AD50000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-15-0x0000027D0AD50000-0x0000027D0AD60000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/3696-16-0x0000027D0AD60000-0x0000027D0AD70000-memory.dmp

                                                                                            Filesize

                                                                                            64KB