Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 05:54

General

  • Target

    40d21a625ebf655bddea1bdec61138cc0b39697a47237fc03a885b248628c382N.exe

  • Size

    129KB

  • MD5

    17ddfe4a848a8710ad64af3f4244e050

  • SHA1

    166cb2b4aa76e9328ea09b5b6b3fbac5ef2604cd

  • SHA256

    40d21a625ebf655bddea1bdec61138cc0b39697a47237fc03a885b248628c382

  • SHA512

    b8f118e5a8127eef7aa531e00d1c46a129c8f64746e0902964179cd4fb8c00d69750b0940493bcbbce6f66f0d13b7d6d7443baf47092e574e1317c861fa49675

  • SSDEEP

    3072:qOiyDxsHWq7IVNuutVY4t3hMafrZknlOwzmwNCdscout0QVp:5DDxsHnIJVY41hx9wtCdscoS0QL

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 5 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 32 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 15 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40d21a625ebf655bddea1bdec61138cc0b39697a47237fc03a885b248628c382N.exe
    "C:\Users\Admin\AppData\Local\Temp\40d21a625ebf655bddea1bdec61138cc0b39697a47237fc03a885b248628c382N.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Windows\SysWOW64\cscript.exe
      cscript //NoLogo C:\Users\Admin\AppData\Local\Temp\hd.vbs
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4496
    • C:\Users\Admin\AppData\Local\Temp\40d21a625ebf655bddea1bdec61138cc0b39697a47237fc03a885b248628c382N.exe
      "C:\Users\Admin\AppData\Local\Temp\40d21a625ebf655bddea1bdec61138cc0b39697a47237fc03a885b248628c382N.exe" /asService
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:468
      • C:\Users\Admin\AppData\Local\Temp\javaSetup.exe
        "C:\Users\Admin\AppData\Local\Temp\javaSetup.exe" /s REBOOT=Suppress JAVAUPDATE=0 WEBSTARTICON=0
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2808
        • C:\Windows\SysWOW64\msiexec.exe
          "C:\Windows\SysWOW64\\msiexec.exe" /i "C:\Users\Admin\AppData\LocalLow\Sun\Java\jre1.7.0_80\jre1.7.0_80.msi" REBOOT=Suppress JAVAUPDATE=0 WEBSTARTICON=0 /qn METHOD=joff
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3588
      • C:\Program Files (x86)\Java\jre7\bin\javaw.exe
        "C:\Program Files (x86)\Java\jre7\bin\javaw.exe" -classpath "C:\Program Files (x86)\Zona\utils.jar" org.sevenzip.decoder.SevenZipFolderDecoder "C:\Users\Admin\AppData\Local\Temp\Zona.7z" "C:\Program Files (x86)\Zona"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        PID:2316
      • C:\Program Files (x86)\Java\jre7\bin\javaw.exe
        "C:\Program Files (x86)\Java\jre7\bin\javaw.exe" -classpath "C:\Program Files (x86)\Zona\utils.jar" org.sevenzip.decoder.SevenZipFolderDecoder "C:\Users\Admin\AppData\Local\Temp\appdata.7z" "C:\Users\Admin\AppData\Roaming\Zona"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:380
    • C:\Program Files (x86)\Zona\Zona.exe
      "C:\Program Files (x86)\Zona\Zona.exe" /copydll
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5764
      • C:\Program Files (x86)\Java\jre7\bin\javaw.exe
        "C:\Program Files (x86)\Java\jre7\bin\javaw.exe" -classpath "C:\PROGRA~2\Zona\Zona.jar" org.gudy.azureus2.core3.util.Constants
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:5896
    • C:\Program Files (x86)\Zona\Zona.exe
      "C:\Program Files (x86)\Zona\Zona.exe" --readInitFile
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:6048
      • C:\Program Files (x86)\Java\jre7\bin\javaw.exe
        "C:\Program Files (x86)\Java\jre7\bin\javaw.exe" -classpath "C:\PROGRA~2\Zona\Zona.jar" org.gudy.azureus2.core3.util.Constants
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:6128
      • C:\Users\Admin\AppData\Roaming\Zona\plugins\zupdater\ZonaUpdater.exe
        C:\Users\Admin\AppData\Roaming\Zona\plugins\zupdater\ZonaUpdater.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:4372
        • C:\Program Files (x86)\Java\jre7\bin\javaw.exe
          "C:\Program Files (x86)\Java\jre7\bin\javaw.exe" -classpath "C:\Users\Admin\AppData\Roaming\Zona\plugins\zupdater\zupdater.ext.jar" ru.zona.plugins.zupdater.ext.Main update
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:5440
        • C:\Users\Admin\AppData\Roaming\Zona\plugins\zupdater\ZONAUP~1.EXE
          "C:\Users\Admin\AppData\Roaming\Zona\plugins\zupdater\ZONAUP~1.EXE" /asService /logPath "C:\Windows\ZonaUpdater.log"
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:6140
    • C:\Windows\SysWOW64\cscript.exe
      cscript //NoLogo C:\Users\Admin\AppData\Local\Temp\hd.vbs
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4316
    • C:\Program Files (x86)\Zona\Zona.exe
      "C:\Program Files (x86)\Zona\Zona.exe" /copydll
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2432
      • C:\Program Files (x86)\Java\jre7\bin\javaw.exe
        "C:\Program Files (x86)\Java\jre7\bin\javaw.exe" -classpath "C:\PROGRA~2\Zona\Zona.jar" org.gudy.azureus2.core3.util.Constants
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4408
    • C:\Program Files (x86)\Zona\Zona.exe
      "C:\Program Files (x86)\Zona\Zona.exe" --readInitFile
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5564
      • C:\Program Files (x86)\Java\jre7\bin\javaw.exe
        "C:\Program Files (x86)\Java\jre7\bin\javaw.exe" -classpath "C:\PROGRA~2\Zona\Zona.jar" org.gudy.azureus2.core3.util.Constants
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5512
    • C:\Windows\SysWOW64\cscript.exe
      cscript //NoLogo C:\Users\Admin\AppData\Local\Temp\hd.vbs
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5324
    • C:\Program Files (x86)\Zona\Zona.exe
      "C:\Program Files (x86)\Zona\Zona.exe" /copydll
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4740
      • C:\Program Files (x86)\Java\jre7\bin\javaw.exe
        "C:\Program Files (x86)\Java\jre7\bin\javaw.exe" -classpath "C:\PROGRA~2\Zona\Zona.jar" org.gudy.azureus2.core3.util.Constants
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:824
    • C:\Program Files (x86)\Zona\Zona.exe
      "C:\Program Files (x86)\Zona\Zona.exe" --readInitFile
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2324
      • C:\Program Files (x86)\Java\jre7\bin\javaw.exe
        "C:\Program Files (x86)\Java\jre7\bin\javaw.exe" -classpath "C:\PROGRA~2\Zona\Zona.jar" org.gudy.azureus2.core3.util.Constants
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4944
    • C:\Windows\SysWOW64\cscript.exe
      cscript //NoLogo C:\Users\Admin\AppData\Local\Temp\hd.vbs
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5304
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 3130D11A59CBEEF5899D8B106C213716
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:5056
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 408A59A752B3DB416A881395AA4D17A0 E Global\MSI0000
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:740
      • C:\Program Files (x86)\Java\jre7\bin\unpack200.exe
        "C:\Program Files (x86)\Java\jre7\bin\unpack200.exe" -r -v -l "C:\Users\Admin\AppData\Local\Temp\java_install.log" "C:\Program Files (x86)\Java\jre7\lib\rt.pack" "C:\Program Files (x86)\Java\jre7\lib\rt.jar"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:4488
      • C:\Program Files (x86)\Java\jre7\bin\unpack200.exe
        "C:\Program Files (x86)\Java\jre7\bin\unpack200.exe" -r -v -l "C:\Users\Admin\AppData\Local\Temp\java_install.log" "C:\Program Files (x86)\Java\jre7\lib\charsets.pack" "C:\Program Files (x86)\Java\jre7\lib\charsets.jar"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:60
      • C:\Program Files (x86)\Java\jre7\bin\unpack200.exe
        "C:\Program Files (x86)\Java\jre7\bin\unpack200.exe" -r -v -l "C:\Users\Admin\AppData\Local\Temp\java_install.log" "C:\Program Files (x86)\Java\jre7\lib\deploy.pack" "C:\Program Files (x86)\Java\jre7\lib\deploy.jar"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1012
      • C:\Program Files (x86)\Java\jre7\bin\unpack200.exe
        "C:\Program Files (x86)\Java\jre7\bin\unpack200.exe" -r -v -l "C:\Users\Admin\AppData\Local\Temp\java_install.log" "C:\Program Files (x86)\Java\jre7\lib\javaws.pack" "C:\Program Files (x86)\Java\jre7\lib\javaws.jar"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1964
      • C:\Program Files (x86)\Java\jre7\bin\unpack200.exe
        "C:\Program Files (x86)\Java\jre7\bin\unpack200.exe" -r -v -l "C:\Users\Admin\AppData\Local\Temp\java_install.log" "C:\Program Files (x86)\Java\jre7\lib\plugin.pack" "C:\Program Files (x86)\Java\jre7\lib\plugin.jar"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:4584
      • C:\Program Files (x86)\Java\jre7\bin\unpack200.exe
        "C:\Program Files (x86)\Java\jre7\bin\unpack200.exe" -r -v -l "C:\Users\Admin\AppData\Local\Temp\java_install.log" "C:\Program Files (x86)\Java\jre7\lib\jsse.pack" "C:\Program Files (x86)\Java\jre7\lib\jsse.jar"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:872
      • C:\Program Files (x86)\Java\jre7\bin\unpack200.exe
        "C:\Program Files (x86)\Java\jre7\bin\unpack200.exe" -r -v -l "C:\Users\Admin\AppData\Local\Temp\java_install.log" "C:\Program Files (x86)\Java\jre7\lib\ext\localedata.pack" "C:\Program Files (x86)\Java\jre7\lib\ext\localedata.jar"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:4908
      • C:\Program Files (x86)\Java\jre7\bin\unpack200.exe
        "C:\Program Files (x86)\Java\jre7\bin\unpack200.exe" -r -v -l "C:\Users\Admin\AppData\Local\Temp\java_install.log" "C:\Program Files (x86)\Java\jre7\lib\jfxrt.pack" "C:\Program Files (x86)\Java\jre7\lib\jfxrt.jar"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:3648
      • C:\Program Files (x86)\Java\jre7\bin\javaw.exe
        "C:\Program Files (x86)\Java\jre7\bin\javaw.exe" -Xshare:dump
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        PID:3888
      • C:\Program Files (x86)\Java\jre7\bin\javaws.exe
        "C:\Program Files (x86)\Java\jre7\bin\javaws.exe" -fix -permissions -silent
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:6060
        • C:\Program Files (x86)\Java\jre7\bin\javaw.exe
          "C:\Program Files (x86)\Java\jre7\bin\javaw.exe" -classpath "C:\Program Files (x86)\Java\jre7\lib\deploy.jar" com.sun.deploy.panel.JreLocator
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:6080
        • C:\Program Files (x86)\Java\jre7\bin\jp2launcher.exe
          "C:\Program Files (x86)\Java\jre7\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files (x86)\Java\jre7" -vma LWNsYXNzcGF0aABDOlxQcm9ncmFtIEZpbGVzICh4ODYpXEphdmFcanJlN1xsaWJcZGVwbG95LmphcgAtRGphdmEuc2VjdXJpdHkucG9saWN5PWZpbGU6QzpcUHJvZ3JhbSBGaWxlcyAoeDg2KVxKYXZhXGpyZTdcbGliXHNlY3VyaXR5XGphdmF3cy5wb2xpY3kALUR0cnVzdFByb3h5PXRydWUALVh2ZXJpZnk6cmVtb3RlAC1Eam5scHguaG9tZT1DOlxQcm9ncmFtIEZpbGVzICh4ODYpXEphdmFcanJlN1xiaW4ALURqYXZhLnNlY3VyaXR5Lm1hbmFnZXIALURzdW4uYXd0Lndhcm11cD10cnVlAC1YYm9vdGNsYXNzcGF0aC9hOkM6XFByb2dyYW0gRmlsZXMgKHg4NilcSmF2YVxqcmU3XGxpYlxqYXZhd3MuamFyO0M6XFByb2dyYW0gRmlsZXMgKHg4NilcSmF2YVxqcmU3XGxpYlxkZXBsb3kuamFyO0M6XFByb2dyYW0gRmlsZXMgKHg4NilcSmF2YVxqcmU3XGxpYlxwbHVnaW4uamFyAC1EamF2YS5hd3QuaGVhZGxlc3M9dHJ1ZQAtRGpubHB4Lmp2bT1DOlxQcm9ncmFtIEZpbGVzICh4ODYpXEphdmFcanJlN1xiaW5camF2YXcuZXhl -ma LWZpeAAtcGVybWlzc2lvbnMALXNpbGVudAAtbm90V2ViSmF2YQ==
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e57fce1.rbs

    Filesize

    10KB

    MD5

    5f67c4d0cfa79bd8b748d0703a70a2ea

    SHA1

    c4f4514d278e108d9337d88c0d4a7ab4b5755076

    SHA256

    7b35f6658c120db4abb4f12bb31c7209baa382e4f5323560a5183b47ec458be5

    SHA512

    2b49311fcaf2dc0d00df95ee0183653776eb642460109ff4d7402b4203e75c43b85dddcdd43bc5401e9bb0adef8348f0020f4b63df92074d4a4f3599b143f66d

  • C:\Program Files (x86)\Java\jre7\bin\MSVCR100.dll

    Filesize

    755KB

    MD5

    bf38660a9125935658cfa3e53fdc7d65

    SHA1

    0b51fb415ec89848f339f8989d323bea722bfd70

    SHA256

    60c06e0fa4449314da3a0a87c1a9d9577df99226f943637e06f61188e5862efa

    SHA512

    25f521ffe25a950d0f1a4de63b04cb62e2a3b0e72e7405799586913208bf8f8fa52aa34e96a9cc6ee47afcd41870f3aa0cd8289c53461d1b6e792d19b750c9a1

  • C:\Program Files (x86)\Java\jre7\bin\WindowsAccessBridge-32.dll

    Filesize

    95KB

    MD5

    1722510af00ea3c7406681b47bf442f7

    SHA1

    cafac266d52d78d3743c31ebef22a894781e0de5

    SHA256

    4010a3ec604a327861bedf01626c12eaded9d381b6e4f0e6f760895838834a21

    SHA512

    31a2ce3d5eb9828cbb82d2a7e29f2c5bf46528d38f25827329512cedde37bd03b3cfdba0aba3320b6c0e7779588958e83bff735f6059aad37172598e70e863eb

  • C:\Program Files (x86)\Java\jre7\bin\client\jvm.dll

    Filesize

    3.4MB

    MD5

    27147e1e3faf9b5ccda882cd96f2a85c

    SHA1

    7103f60121727917f812bfc7cdff5347fc17cc8e

    SHA256

    500d359211ece211cf672de328345876f016fb4a476b2a03cbc3b8b89023ae1f

    SHA512

    0866c604911e243687e7fe721142eb882b19691c902736b59ba304933463d8c9154ecc319b91c9771cee8139e151cc2a2e960bc7a93ed97352cf5232a0964194

  • C:\Program Files (x86)\Java\jre7\bin\deploy.dll

    Filesize

    371KB

    MD5

    87ec9d4a00d34eb6a0f8f92e1d1cc08e

    SHA1

    bee4ecae201905096dd44d1d348ecb3556d90832

    SHA256

    352707a271a9ab5d0e190a539b6468d6c6c5ce9675b300acf2305aa1f30625d8

    SHA512

    5b7f9866168ad7948a5a80078b14ff747201d17922ca907072a081e0078f6ac68446ddd36b027b4a17f5afa7d1bb4962642cff28cf66867171ebb78735f242d2

  • C:\Program Files (x86)\Java\jre7\bin\dtplugin\npdeployJava1.dll

    Filesize

    864KB

    MD5

    bc3a575dfb1a58d35e8617f2966bf1ea

    SHA1

    6353630f62e246d7f462134e8d10a7a42935e20f

    SHA256

    c029fd3c6ffd2158d0633fc122786838a6f5d3cc7ef78bbe934697015c8c63dd

    SHA512

    c976da30d343f8e104bec72300dc0c17e582e380f0a3ae85b242dbf2d5b40459feb4a3b7789fb8d755b21cbaa0940038d20dbbf1296a48e77b461092abbbe514

  • C:\Program Files (x86)\Java\jre7\bin\java.dll

    Filesize

    117KB

    MD5

    a258a133f7d565600647a248ab95792c

    SHA1

    1c6a855ca1fc04413b906b0b17609eff38317161

    SHA256

    81ad5696a6fcad89127fc7a428636d431b446ff1ee0c37bf87e8d513a8bae7af

    SHA512

    bf9dd97947eb0c71243ae28255af54b06d9e17af7ade666538dd93f9fdf6d8fbc3855f48bfaf6522dbd9ce3c6cff655581f092709670606d033f2321b1f4a5e7

  • C:\Program Files (x86)\Java\jre7\bin\java.exe

    Filesize

    171KB

    MD5

    88651044108e995f9801e35d2582491c

    SHA1

    abbf404c0253d085223a64ab947e1057c4211c9c

    SHA256

    c7fd72a0730b377c6da5ac80cdaf5f4cca84cc999a563a4c420fe5a8576810f8

    SHA512

    486b1d7ad7c3debcb8d70f9351adb08c8321c4cfb409a00ff818be1dacdc376a0eded630ccdc74aa99cc472589b88c9681989076fd78eb109759d33e7bf70543

  • C:\Program Files (x86)\Java\jre7\bin\javaw.exe

    Filesize

    171KB

    MD5

    64e2bb67ea740860510dcc5c2b6ffa2d

    SHA1

    6c5996358264624cdb4a075acc4f0b46177cd259

    SHA256

    844ab2231f45fad60d81770ea36d9937da9aa72cd905ce06e7471ddf9d69263b

    SHA512

    ed24331883ada44d8b034f5c8bc458e53234109d5cd02a27989972033f5b3305d23365106ce80be81caa16e472c14c103e457a1e0d138eb0d95036e58d877462

  • C:\Program Files (x86)\Java\jre7\bin\javaws.exe

    Filesize

    266KB

    MD5

    2b4493bb1f94580c41def972ea9a887e

    SHA1

    880ca8b20c6df9a6a176b91cc50304cb0fe66d06

    SHA256

    841339373958786d9c93a7dad5de8fd213ed6b5ad69623f5a5762a453c48e0a5

    SHA512

    b43e54f2c1f3e0a3c3d2fcee518e47d17476bb735606351e41b49e97e10af758ea9a539ac370a2d12cffa93e3e752e829db969968664c59386f65b732c29e40e

  • C:\Program Files (x86)\Java\jre7\bin\unpack200.exe

    Filesize

    145KB

    MD5

    0d46182b6134aa9c7acd16133d67e4c3

    SHA1

    7b5be3d65e5e744723bf55a08f9dc1042585d5eb

    SHA256

    c89091f2a4de2fcf10b30e54a74ec5764e2dfc0577f4f1d879ac8816e3b08bcc

    SHA512

    735b6c6bd69b22a71c15ae44c6fa1693700321dc3b4b2367ce05d5c37df62e45d1d3836c2c0f5e44be1036aeb11a533c2a4dbec55163b4a15adfa1c8ef75673b

  • C:\Program Files (x86)\Java\jre7\bin\verify.dll

    Filesize

    38KB

    MD5

    cb89b1d71061f5ec52468528ecc0b1fc

    SHA1

    6feb23a8b5719c8997de92c7da644807fcba8819

    SHA256

    87d8d59972e73700507c07cee8750b0053c6a0899410338722a00c2803d39ee6

    SHA512

    2ff0ed38c7f28eb7ea16f24a0841dfb3306c4fec48ded5fddec8c3140f1a425433a444fe6b6cc4c17b3a39841c8ab0c23d7c9525c119c1b9d6daac2c17a4e4b0

  • C:\Program Files (x86)\Java\jre7\bin\wsdetect.dll

    Filesize

    159KB

    MD5

    958bc8d82e4d0a5b51536bb4fc4fb6d6

    SHA1

    626312fa01c72ec5c85c9262ba0ae97a8b1f5b25

    SHA256

    2ef891881d506084ed182a0ac58b10dbe8c45877ef889ac9105f19431beee4ca

    SHA512

    fe17b58e3eed817619bebf6d091aee99fdc331c9c5a4163e9f5993b41b2e7362365da210e0636755ada6b8838012de1bc5435b8670aa12f378a3c9e3a9f5af04

  • C:\Program Files (x86)\Java\jre7\bin\zip.dll

    Filesize

    66KB

    MD5

    1ecf056944068b933ba71cda3edc4a68

    SHA1

    2052b2138db0d9a368942470b41bb6fc5b1d4007

    SHA256

    35ce7ab154a38e97951714e17f7689873d89e8c01188de6e5cd741bc0ca3e384

    SHA512

    cadf312841d392a9970cc068b72063e17454d5e6738b46ec9622257d9dfc0bcad0d9420352752bf7d8f8e8ceaf6aca97d83896f753dc12cfeac3e5efb5e1ab05

  • C:\Program Files (x86)\Java\jre7\lib\charsets.jar

    Filesize

    3.4MB

    MD5

    3f080df73b2d7cad61bddcf709aadc72

    SHA1

    616e9ec760722737f38213f43755131f836dd627

    SHA256

    dd213d0867714191e351f589dc709d6f3cafee819aafda8f8fe022d367ea189b

    SHA512

    733b65d3662f2eb9a8f64212e306d934929a05fd753040073f7e2769df77791c29aef9e35610b7b22597bbea6d805a8e04f93235fe761bf6bd5c5733c867025b

  • C:\Program Files (x86)\Java\jre7\lib\charsets.pack

    Filesize

    1.3MB

    MD5

    549bbcd204914b543dafee670f110834

    SHA1

    012461935191a55482e8c3d453d245e965a10a2a

    SHA256

    8ea5af036ec067a0abcf87b8f5921e2281ff9d259e1d4c3bbe7fa9037cd87d02

    SHA512

    b0346a2ec52ce47351286f27f347f5fea99e160aedde52bcf74e1629739704bd975c9c99d8db6be3b6bd45e7fa933616fa081eda49e9b911efcc031c7241400e

  • C:\Program Files (x86)\Java\jre7\lib\classlist

    Filesize

    73KB

    MD5

    1a0b7592ab9c12aff1191dfd225154ca

    SHA1

    3d3fb5f326f2caea866028558834ae684a2fe09f

    SHA256

    3837e95826d2273a54e3869efcad1521e000215428a2c7ee9397b650834ebaf1

    SHA512

    b2932400b6d8c72d344cb0592f121623dd848dcdd341248cf18cd55cd0c4fbd7f923057d022f89586ec6062299d756a37b3ff4308f10865de6ba68b2ee530fe9

  • C:\Program Files (x86)\Java\jre7\lib\deploy.pack

    Filesize

    1.7MB

    MD5

    b2a448112b7c886ccce9b6a3d5efd8a0

    SHA1

    660bc9efe960015b208a421b1a63443e7151024f

    SHA256

    928f6b847f94b920c462a08c43f0dfd3f7c40076b1cd60545523a5c27a4870ca

    SHA512

    871da63f4eaf16d77ba6c19c10d8ddd8e94f744c20a70e24793f837023d20e56698d85f67498bc06ec37b73a8f376c220afbe7f3884b00536b710ff49c339b3f

  • C:\Program Files (x86)\Java\jre7\lib\ext\localedata.pack

    Filesize

    736KB

    MD5

    c8dc1cfeaf0fefc39ed0f1de4eaa175c

    SHA1

    11cacbb9e5724d37789455de37a225d8e0c648a1

    SHA256

    da2803a283d28882182e1e280b4f25ee1579a5805e73fcc9882e63968f102a8f

    SHA512

    6b419ba94ae90f8caa3a57690f2ec7e249c9fb8ab86819439621cde1243c7636ee76820622ce32ed483ce76976f7ced74778898fc2725b1a2407b039fb53508c

  • C:\Program Files (x86)\Java\jre7\lib\i386\jvm.cfg

    Filesize

    686B

    MD5

    5147cce789cd18ad6b2996eb89e5d866

    SHA1

    756f1fffe96ef581f0d4d47253523544c89a2622

    SHA256

    c471d622198461715f245d478484fc7c8de533313c56e922931a875460a5aa88

    SHA512

    55f53adb70b1cf741cdf0dee74d92d2bf4c96954a760afae289972a0ea9bb27bc5eb4df1bd41829c7c484211fcb294fe296a4d560d8a1cdbb8c707b3bf2a79a6

  • C:\Program Files (x86)\Java\jre7\lib\images\cursors\invalid32x32.gif

    Filesize

    153B

    MD5

    1e9d8f133a442da6b0c74d49bc84a341

    SHA1

    259edc45b4569427e8319895a444f4295d54348f

    SHA256

    1a1d3079d49583837662b84e11d8c0870698511d9110e710eb8e7eb20df7ae3b

    SHA512

    63d6f70c8cab9735f0f857f5bf99e319f6ae98238dc7829dd706b7d6855c70be206e32e3e55df884402483cf8bebad00d139283af5c0b85dc1c5bf8f253acd37

  • C:\Program Files (x86)\Java\jre7\lib\javaws.pack

    Filesize

    205KB

    MD5

    491bce42c6cd8af88a2e11f37711ed4f

    SHA1

    3de7c18fee44465a6afe34e068f2a64dea9fa324

    SHA256

    ee43869ee94eefe241d661101ff6a03cc276f8e558967b1b350ea088f1dad2e2

    SHA512

    1e5f99466b77b5a82c23449434272acf5746811ef96b98105f89b3339ccd86734d7713c94b773755219345d673a761a356fbe846a38e7893bd8894e43cf102e4

  • C:\Program Files (x86)\Java\jre7\lib\jfxrt.pack

    Filesize

    3.2MB

    MD5

    dfaa6429468d56ef77932cf26a495f75

    SHA1

    8a21a29225640f1829ae328a24ef9cb5e215a4e0

    SHA256

    8c481a549acfa58b1bac0385906febe33a928d004a529fec505b6a9228678fed

    SHA512

    6c19ed573b111315648de0646441486729b304452c15b2282938460a2339db0be4e1eb19cf6f2bf17f73037811ca2553a15957ea96b9d9af64a93045407c1148

  • C:\Program Files (x86)\Java\jre7\lib\jsse.pack

    Filesize

    141KB

    MD5

    31b4d9c29d29567b0ae3037fac9fbdc6

    SHA1

    8b5d1b1a309177466d71a742414d441f600ea38e

    SHA256

    9f031f2f1292bb311c400b0a93a11b78a08f013332b1263ea58617b6548862eb

    SHA512

    b4a8a3a1e837f98a3164e19a6fe939819eb336892335de975822890b52b5923d85fee4c4e5464ccb0d46c847f37f7da98a839aadbf4d20fca355f396a53836c0

  • C:\Program Files (x86)\Java\jre7\lib\meta-index

    Filesize

    2KB

    MD5

    8bff510abed2b6fcc5a83eedb65b1766

    SHA1

    ba6d0cd7504a5baeb963501b8bdf315ec6cb355c

    SHA256

    afb4850419612e0daf1876a5d61120ed0ccae241f188c25c014602007b3a765b

    SHA512

    8786bd672ce9c53f4c31f8206d621eb06ae7527f9adf3700955cc1cb928dde145b684666a5eb4ac11301541f585970ccd377ba144da351741e3cb5769b6ff522

  • C:\Program Files (x86)\Java\jre7\lib\plugin.pack

    Filesize

    489KB

    MD5

    47d6cfa1b01a6d41885504bbc3b1919a

    SHA1

    3838060f9d530c972d65f36fa38b265120a218aa

    SHA256

    93defaaf7f82e2e9565b27dd31a41c89e02d1b7719d0da0b940a55dcc75b91e5

    SHA512

    b0df9b174624234aaeb2b50cf611f698377925a0ae5c5ee9da46c65fcecf4d28941d1bf2332316d9327981c1f8c6c4fecf750e013f04eef63f5df52d27593135

  • C:\Program Files (x86)\Java\jre7\lib\rt.jar

    Filesize

    49.4MB

    MD5

    bac77d8d145bd553c7efdf7978d9dff0

    SHA1

    31da52beb0237a6ffd6ebc4a766d92f12a226fb6

    SHA256

    a85b24d93ceb6095691838dda51d31bc5e8dc94663514b46c48d7c41d351aad2

    SHA512

    2aabc1986338a68cdecf6d46afd6492a90940d9412bf8f7ad7c6183091403a784244ecf1007dc3875a892c0b1c2557f5de31f387011ca8db657f4367f5fc86ba

  • C:\Program Files (x86)\Java\jre7\lib\rt.pack

    Filesize

    13.1MB

    MD5

    b6d75e8c90c79af1579769f10b1e5c88

    SHA1

    146cb3f05fa161885e8faf079fa2bbd89b5c5b18

    SHA256

    82dc6806d9ec9eb16604f90a5c78d0d882b69a0e718d8f6c3c6b7c9719887b7e

    SHA512

    02cdd0c0d6e71bc09120db2cd3b9471c0176567d92bb74a08c13e82c1d23722eb4afac41583a11dee3fc531fd442754ee0f5cb964898ec036ddd432947996037

  • C:\Program Files (x86)\Java\jre7\lib\zi\Etc\GMT

    Filesize

    27B

    MD5

    7da9aa0de33b521b3399a4ffd4078bdb

    SHA1

    f188a712f77103d544d4acf91d13dbc664c67034

    SHA256

    0a526439ed04845ce94f7e9ae55c689ad01e1493f3b30c5c2b434a31fa33a43d

    SHA512

    9d2170571a58aed23f29fc465c2b14db3511e88907e017c010d452ecdf7a77299020d71f8b621a86e94dd2774a5418612d381e39335f92e287a4f451ee90cfb6

  • C:\Program Files (x86)\Java\jre7\lib\zi\Etc\GMT+5

    Filesize

    27B

    MD5

    a2abe32f03e019dbd5c21e71cc0f0db9

    SHA1

    25b042eb931fff4e815adcc2ddce3636debf0ae1

    SHA256

    27ba8b5814833b1e8e8b5d08246b383cb8a5fb7e74e237cdbcadf320e882ab78

    SHA512

    197c065b9c17c6849a15f45ac69dafa68aaa0b792219fedb153d146f23997bfa4fbc4127b1d030a92a4d7103bded76a1389df715b9539ea23ea21e6a4bb65fb2

  • C:\Program Files (x86)\Java\jre7\lib\zi\HST

    Filesize

    27B

    MD5

    715dc3fcec7a4b845347b628caf46c84

    SHA1

    1b194cdd0a0dc5560680c33f19fc2e7c09523cd1

    SHA256

    3144bc5353ebbd941cdccbbd9f5fb5a06f38abf5cc7b672111705c9778412d08

    SHA512

    72ab4b4ad0990cce0723a882652bf4f37aac09b32a8dd33b56b1fbf25ac56ae054328909efd68c8243e54e449d845fb9d53dd95f47eaaf5873762fcd55a39662

  • C:\Program Files (x86)\Java\jre7\lib\zi\MST

    Filesize

    27B

    MD5

    11f8e73ad57571383afa5eaf6bc0456a

    SHA1

    65a736dddd8e9a3f1dd6fbe999b188910b5f7931

    SHA256

    0e6a7f1ab731ae6840eacc36b37cbe3277a991720a7c779e116ab488e0eeed4e

    SHA512

    578665a0897a2c05eda59fb6828f4a9f440fc784059a5f97c8484f164a5fcec95274159c6ff6336f4863b942129cb884110d14c9bd507a2d12d83a4e17f596d2

  • C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\deployment.properties

    Filesize

    1KB

    MD5

    6037650eb5b22b2d2d6f1e0fd5dda47c

    SHA1

    cd00b2f03ad3750065295fe3b2de74a319e4111f

    SHA256

    3a2ce03af3ee36a42db31711269ed6138000854261eaaf34308430fc9483f429

    SHA512

    be73beef9f97fa92f3ca6e1eed6c4fc86fcf030f947f66cc7e0ea5c25e4418ddc2ef8f33247d26d7eddc8615be23dfe906f26a7f74ca004e9ad045198f589fd7

  • C:\Users\Admin\AppData\LocalLow\Sun\Java\jre1.7.0_80\Data1.cab

    Filesize

    24.6MB

    MD5

    003a488a2139105704566b47eb29520d

    SHA1

    52d672a592cd52ad5e2e7239421f2659e0d17afa

    SHA256

    a84262dd486cf59049d0d2d9a1b00dfb5aa5271592edd8de0e052f12496dec67

    SHA512

    ab34061f8e04bb1d59f1b35e0e1848a176f2b119095e79015130da3a4384c70fa35ecbe1625e07c0eb0de49c67bcdbba59f10fa1dfbbb2066dcb6ee6825215de

  • C:\Users\Admin\AppData\LocalLow\Sun\Java\jre1.7.0_80\jre1.7.0_80.msi

    Filesize

    898KB

    MD5

    e24d9b483ce7a3a6a4406111883457f7

    SHA1

    0d5efff0d110c48f5e6f5d438967427f1e2dbf84

    SHA256

    dbf28e21d55dd662cccf4d422a1a645a6a3dbfd6914942dde417d20c4d2fe01c

    SHA512

    b614b023ce683e78ee685be028fa06d7df90f10360d55de2a8c1214200b0b85998683502f377b01584bf23b72b168c33ef560a78d7abdf68aa3af87beca59398

  • C:\Users\Admin\AppData\Local\Temp\RUpdate_r33.exe

    Filesize

    146B

    MD5

    8eec510e57f5f732fd2cce73df7b73ef

    SHA1

    3c0af39ecb3753c5fee3b53d063c7286019eac3b

    SHA256

    55f7d9e99b8e2d4e0e193b2f0275501e6d9c1ebd29cadbea6a0da48a8587e3e0

    SHA512

    73bbf698482132b5fd60a0b58926fddec9055f8095a53bc52714e211e9340c3419736ceafd6b279667810114d306bfccdcfcddf51c0b67fe9e3c73c54583e574

  • C:\Users\Admin\AppData\Local\Temp\ZonaInstall.log

    Filesize

    2KB

    MD5

    206b2934ee1804a38fa353796b3b7807

    SHA1

    3568da1968d0df356298dbc41f22f22326cb513b

    SHA256

    afd25943dafbb24589db0363f698780678ba91cd3287e08b2ae9139b14b05ff7

    SHA512

    176e00035f2f67b9da8a7d51629c2bfdebc05f078ab0a01e2a356429f22bc9b26bc8ad9b4519253929173486c34c223b98a5bc18a38aa4ba746db58af283a5f2

  • C:\Users\Admin\AppData\Local\Temp\ZonaInstall.log

    Filesize

    4KB

    MD5

    076b134e834a9d908387cefac1ec1389

    SHA1

    c44acb20eb9c4de62103bbe509849238a6477e3f

    SHA256

    12a4db81fcc92449f778e98e4bac63e3c65d33ff75d502b8c1585c00883e92d6

    SHA512

    9c70a974818edc56df606e698a3af0e9259c3b0e20182eb8ec9cfa342f7a62c3935478f2dcac534b04d2c021b2b165b51f1f41469ba8559f8c367898f3d636f2

  • C:\Users\Admin\AppData\Local\Temp\ZonaInstall.log

    Filesize

    4KB

    MD5

    24c2e817b3fd783eb6a566518c0da84e

    SHA1

    0c2137da29ab51025d1364407ae037f897638c19

    SHA256

    34a40235fdab01c17895e471632ff507fe5e1f6461f870a40a0415b3fe62ff36

    SHA512

    61e62d1ee9eb882deca252195d71c8500d49de51c3fd5b4bc00d2c2af074b028c4d47054e0c8020a1e68247a55a1210f6351e7e30a41d825bc48c7c05143e775

  • C:\Users\Admin\AppData\Local\Temp\hd.vbs

    Filesize

    245B

    MD5

    d8682d715a652f994dca50509fd09669

    SHA1

    bb03cf242964028b5d9183812ed8b04de9d55c6e

    SHA256

    4bd3521fb2b5c48fe318a874bf64c6b1f62f5212b8c88790006cafaf31d207ba

    SHA512

    eaa39d87002df1eea16b215c9f099731253b7af72e46b12f64423874dbcdd8f68a164d7641bafb3f854aa6ad8aa7269da59ed0b32cd41eccba5d6f296f9a52ca

  • C:\Users\Admin\AppData\Local\Temp\javaSetup.exe

    Filesize

    28.1MB

    MD5

    f2fd417b6d5c7ffc501c7632cc811c3e

    SHA1

    305c1493fca53ab63ba1686c9afdfb65142e59d3

    SHA256

    a87adf22064e2f7fa6ef64b2513533bf02aa0bf5265670e95b301a79d7ca89d9

    SHA512

    289ee902156537e039636722ad5ac8b0592cf5cffda3d03cf22240003627b049382b95db1b24cf6a2f7134b0df93ede65a80a86381fc161b54c84a76ed04458b

  • C:\Users\Admin\AppData\Local\Temp\java_install.log

    Filesize

    22KB

    MD5

    525bf7f5b63ffd5e86fa3aee92551c21

    SHA1

    bf3cd939fe57f5076afbd231cb5b1b0ea03ba5d0

    SHA256

    e0e88bda4bcbbcfadb1009060372744f8b3f3628ae29b1d310a99255ec76aa7a

    SHA512

    825d048f8a3eb7ec88bda27eaf34b5c05a9545a12d48d29fc264aeae571fb2b4aa2957cd1b5459d53dc5d18b7968760d47136a6ec099c5612c3a7ab677b24d73

  • C:\Users\Admin\AppData\Local\Temp\java_install.log

    Filesize

    23KB

    MD5

    18f48d6714640435ab93cad409e10070

    SHA1

    fd33c178274fb08adb77cf5c695ce29ba32417bd

    SHA256

    f7468e1cf9cb05006bb7eebf4ce106f98828351ac7d8637486794ba90e5f5bc2

    SHA512

    632e4957e610ab787ed9a2cf3e8d988acb16e4cfc4d4df9b52682ca54fa4f7fed980b7b5dd69b1c4dd71554894ee5e5199da630b721f3c7403652f923a16dcc1

  • C:\Users\Admin\AppData\Local\Temp\java_install.log

    Filesize

    23KB

    MD5

    a2623660c345873243bb8f88145663b5

    SHA1

    d8cabac7b4057649bb6ca31504719fb0881c7190

    SHA256

    3532daff57c2b70280ef79edf17af55d108b2d46b88bdbf248fab74db2a43d14

    SHA512

    60dc96479ae28a9011dee7a2e8ff2cb60ab548a6164ba8f5562fcd1cb154362677a68c98c62aa62333ac9812d4ddb3e332957efdbc5acfb5eade18f111c21f6e

  • C:\Users\Admin\AppData\Local\Temp\java_install.log

    Filesize

    24KB

    MD5

    e2aaff5f40ba3fbc2df129ed2157dd19

    SHA1

    8d6b9aeeae45922687e24365cecffdc0e4997f08

    SHA256

    1e1a1fcf7c15b8f6019b1696765c696e69a510bb25fd29daa4f8286b206e738a

    SHA512

    e1e5a42c4b5bac65b4747b149a694d738fe7e4e7c5398ef564885796e4d9d3cf5ae4ef1cd2066dd6ba24463654c090d79ac84e0f1ad76575155deab8088e6843

  • C:\Users\Admin\AppData\Local\Temp\java_install.log

    Filesize

    25KB

    MD5

    250dd63c170bf6cc59e2a7a34edb348b

    SHA1

    da811a6038e340332de88fe1c2a574ee1bb8a8a8

    SHA256

    f46f4d796f236751d277dc24184765679d409c0e454ae07587ca09e0710a0f1f

    SHA512

    ffc14529043f3231ace3beda1cb14de9ef37d24221d462138eb8fe9cb255eacba42bb864e41a575b7c14773ae577f6e44afcd408f2415678f1019895e3c376c4

  • C:\Users\Admin\AppData\Local\Temp\java_install.log

    Filesize

    26KB

    MD5

    6395ef19c45e81bddd74837a1394acb5

    SHA1

    92a97d8fa5c76891d0df4b4d9812370ee85859b9

    SHA256

    a0da062ab80c0dc8d84f51bd76faf53001cd4b48bcbc0ddae6d75e210ea92ccb

    SHA512

    5bb7439566d386aa46774e71378284fff75855f2b5971345d54e5142a23a9488a49b1de2a9533d37cb3f33c8d50cc64727daac7c96ca6dd3779144379a068fdb

  • C:\Users\Admin\AppData\Local\Temp\java_install.log

    Filesize

    26KB

    MD5

    cc147c8509b89de26462cd73e51d3df4

    SHA1

    b37e85f40a18c1832530a760b309799378f7f6a9

    SHA256

    2f0f162f348b4020566418fd30c090fac83883284dde7c163b923f68d0886c69

    SHA512

    b8ef88fc7c91371605dc12a6fae41fa576836ad7eecbf728cd78ab5de9b235c221d5f43d2e9f9adc234f6ae5c3e823dd1b213aaa0340aa8d341015ad393a3e93

  • C:\Users\Admin\AppData\Local\Temp\java_install_reg.log

    Filesize

    3KB

    MD5

    a571a80e3e7f07d8d5318528ffcf057f

    SHA1

    e3ec23f4b500ff697f327a186c6b7a1d0203d242

    SHA256

    9bf99654183263090ac650e9f691e074a0de278848a0b618df2c074d9fac23e7

    SHA512

    70db57b8e9aafeaf7fb4e7c7bc4a7b91297b3e5ed7dbe683c63c8191bd98c0a92457d92ee4ee379eca4935c85362cbbfb1bc9fa4a00cc010afec40752d641be4

  • C:\Users\Admin\AppData\Local\Temp\jusched.log

    Filesize

    163KB

    MD5

    05219acfa2729848565287caabce88e1

    SHA1

    b720eaf19849379e4ca80cf27263174e72b1b811

    SHA256

    41a406c9c336df63d0ff8d492a290569b23c5fd16e3bdd7d8657c009a6219ca7

    SHA512

    4c6ee3d750ecb918c34eff87cdce1d3333c65611eb9c0c818563b0069450720f14f1e87cacc47a4235dcd34c8da5385014e3d4b6dc4c384d7c4449fb4be6280b

  • C:\Users\Admin\AppData\Local\Temp\jusched.log

    Filesize

    163KB

    MD5

    c2998b80fa5c84a52e33c3e5edfdfe20

    SHA1

    743a15a9246eacdaaf26de457cfc07c057ad18b2

    SHA256

    a777bcc894dc5a3414d7f18f050958881cc867380c5c862b54d75c73da24c92d

    SHA512

    4f3c21751f39c87f54ab6f29ab4ebcd69e58028bdc8d9cf313065062f653a69552bda083cf0d21b674b90f6f248264d48da5f6f521cef2e7afc7a3f16a7a2a08

  • C:\Users\Admin\AppData\Local\Temp\jusched.log

    Filesize

    163KB

    MD5

    1c340bd295c0fcd6d2da487883b68f50

    SHA1

    acd1eff7b585f66fde885c6d1a03bac0402beb59

    SHA256

    6905046869471a84fbbaf56e7ee455d5dfb78b9a3b66cc26bd37da41e7eaa9d8

    SHA512

    4af6fa159e1a411a2dc2f5350a2c1c318cd330709da8c7d198eafed84d88bb50d30947d470a6291e068652fc52bb40fd686e2e9290f287deaa7124ff51cd426b

  • C:\Users\Admin\AppData\Roaming\Zona\init.xml

    Filesize

    348B

    MD5

    0e643d8a669bdea52bd5e3b7889483bb

    SHA1

    dfb1041773993baef4bfba15a9096060b258f069

    SHA256

    c4e36154f5b170f32150568a69d668ba4bb6067d781b8b076e2996400bd37316

    SHA512

    633dc74ce51fbb71d073d540365162ca9665260a86a89fcdd574327c68bd320c8fce28368c4818a52260bf2b8abcabfab58446eac466ce1adf88ed1386e59b66

  • C:\Users\Admin\AppData\Roaming\Zona\launch.log

    Filesize

    1KB

    MD5

    76ac0621e3db213ac56418d0600ae68d

    SHA1

    d118c9d763de7a0d45beecbc8659c4502b114c75

    SHA256

    fff6b89cce95b25d7fb821967a0f728197defbd7e99c56da971160ae459530ca

    SHA512

    7e94e52fca3a493922152953b3e7a4eb32c5c6143ecbcda7d436a69c1f23f971b24365f15679ddeec21d0975b7285aab0f2492a1d5eb33a60103c7d9a9ec8c89

  • C:\Users\Admin\AppData\Roaming\Zona\launch.log

    Filesize

    2KB

    MD5

    fb73f921310125aaec7d19c28fe7f238

    SHA1

    7da11f1fc22f3bd1fadde4a14fcf3e3f654e98c4

    SHA256

    ae8507c9f212d5298632ee10cb8774e7fed92f9745df1229cfe36b60b6fdb23b

    SHA512

    79848272268c529135f63a245e416164de3c6044c3d69ae0e77510df67f5a9b55f5713fb85c00b39ed4a220bd2c5b745e470db6b6620685a037c2eb4719bf418

  • C:\Users\Admin\AppData\Roaming\Zona\launch.log

    Filesize

    3KB

    MD5

    73fc8dcab1e439653c12a096cea89723

    SHA1

    5b5e0d5f75592a827d770926b76d77e1a6358146

    SHA256

    7b65b61aa15c872275456f2d3dd13bc49e2f345cf443d3a6fa416c5d84cb91cd

    SHA512

    4d2541c46ae22cdb3087ab0edac3adc7977f159cb59035912266fc9032da8919505bb6f5c17a84b69c16b19cbe51ced43edcf793e957139a6a27db166fea872e

  • C:\Users\Admin\AppData\Roaming\Zona\launch.log

    Filesize

    3KB

    MD5

    e851451159c4b69428869c6ab10add47

    SHA1

    f473f2abb06e24bc1838f29310e658da63276d8f

    SHA256

    fbfcad753e092e54e5dc4ab56df720c622fb684a99c953346ee38af00cbeba68

    SHA512

    081119d5a7ebcdc924362476532413cc68c50154296e84f77397095bca927145b8da71182a333b3e5307664e7d538a60b83527bddd6cbfe5f2739491000aa127

  • C:\Users\Admin\AppData\Roaming\Zona\launch.log

    Filesize

    4KB

    MD5

    87bcd8594239c95b25464b2dff769628

    SHA1

    7dd74244ee4131629115f7f85d14b5fbb0be0670

    SHA256

    0e3a9ece25d0d4f9b93a78484f8badd387b70eeeb40acb12f01640bcb7b47988

    SHA512

    bc16a6af32c21985e640ca69fd1f5a573b4af3944bc2a6906c9e40ce3911ac41894157f82674b3f5b2292ab25a527841458acb62717605eea19f01fcffae0cf9

  • C:\Users\Admin\AppData\Roaming\Zona\torrents\AZU2718507644903651002.tmp

    Filesize

    28KB

    MD5

    cadd1d3521af856893bde2a1db1804b1

    SHA1

    a0a9f1a3b729af16555972302e75035776c111b7

    SHA256

    ce03e50d68c97ce903cce1d337b8b45d5df43cbf5fdb15fec4b19ea55242ad76

    SHA512

    503a432c79ba9970f38cc5aa8e5f99e9b11ddd862badfd22050db0d65780b87688d286dfab3164dfeb86d5a03f8260c251a021b4e76ae47060fb3853e6dab6e4

  • C:\Windows\Installer\MSIB.tmp

    Filesize

    202KB

    MD5

    9f84d910602183954bed6d9660600783

    SHA1

    82e3b122dc63e0a333bca531dd16667d5fafbf23

    SHA256

    bf4e4c75d148cb412e28a0b4e665919fd5ac6b9aa6bc3fa75401394759218d5e

    SHA512

    09fb450e6c6f22a32d5e06f470070aab17d4973afe307b529093af7fa29ab96b61a89814e4964d005459f8ebb25716134a5e1c41f6ea7d260361b135306544b9

  • C:\Windows\ZonaUpdater.log

    Filesize

    2KB

    MD5

    65f42fae54bbe1ee91e227d64d421d86

    SHA1

    f77dda617fe6e09ae1bda3fbffc1b080bd74359a

    SHA256

    3ea89a9302610f08cf3ad320545692bcd44d8f99ccca943ddcd9165feb96454d

    SHA512

    31e9019c756a63c131b78ba8d1ddbfac36d803da755654c388aeafd9a62067df2734495b3baecc7e133ffab6c6c9c5ce000768467a095e90c56de38f97431b26

  • C:\Windows\ZonaUpdater.log

    Filesize

    2KB

    MD5

    8b3faac5c1f5427370c9236914fdd14d

    SHA1

    ac82a791802867aec1a6a08e376924ea07ff2983

    SHA256

    a0e04a5f53450224ce0f6aac093caf688649ad2001f192e6220a9fdbbb57d173

    SHA512

    ba487732dc39fd41fe5cce9296b855aa023855ba97126537822eaf6bf4953ab4982de4780edad0f742826ce4f1f915f2f36df9ee4ef476147defebc487622a9d

  • C:\Windows\ZonaUpdater.log

    Filesize

    3KB

    MD5

    f777cac2cae7250f67ef22809612da4b

    SHA1

    53e8824fb4cf4844e160f8c600cffad0a1fe026c

    SHA256

    2e32e0a92e4429f8c1a575343d1fda4129eb8a1554161333980150c64c44f154

    SHA512

    ea2c235933c21490bb3d6caeeaed50b5a048a716bb0c7bc3bfd4c5e683461506680a8d3e447d99a4e1c7d63026ba3f89aee8ca8f314eee321161c2f31521580c

  • memory/228-1581-0x0000000000D40000-0x0000000000D41000-memory.dmp

    Filesize

    4KB

  • memory/228-1575-0x0000000000D40000-0x0000000000D41000-memory.dmp

    Filesize

    4KB

  • memory/380-1703-0x0000000000E60000-0x0000000000E61000-memory.dmp

    Filesize

    4KB

  • memory/380-1724-0x0000000000E60000-0x0000000000E61000-memory.dmp

    Filesize

    4KB

  • memory/380-1670-0x0000000000E60000-0x0000000000E61000-memory.dmp

    Filesize

    4KB

  • memory/468-49-0x00000000003E0000-0x0000000000430000-memory.dmp

    Filesize

    320KB

  • memory/2160-0-0x00000000003E0000-0x0000000000430000-memory.dmp

    Filesize

    320KB

  • memory/2160-48-0x00000000003E0000-0x0000000000430000-memory.dmp

    Filesize

    320KB

  • memory/2316-1636-0x0000000000F80000-0x0000000000F81000-memory.dmp

    Filesize

    4KB

  • memory/3888-847-0x0000000000A70000-0x0000000000A71000-memory.dmp

    Filesize

    4KB

  • memory/5440-2252-0x0000000000D50000-0x0000000000D51000-memory.dmp

    Filesize

    4KB

  • memory/5440-2250-0x0000000000D50000-0x0000000000D51000-memory.dmp

    Filesize

    4KB

  • memory/5896-1793-0x0000000000AF0000-0x0000000000AF1000-memory.dmp

    Filesize

    4KB

  • memory/6048-2112-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-1926-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-1989-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-1999-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-2011-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-2057-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-2436-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-2129-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-1973-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-2179-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-2221-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-1965-0x000000003BFB0000-0x000000003C020000-memory.dmp

    Filesize

    448KB

  • memory/6048-1955-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-1982-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-1927-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-2274-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-2277-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-2278-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-2284-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-2289-0x000000003CFB0000-0x000000003CFC3000-memory.dmp

    Filesize

    76KB

  • memory/6048-2310-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-2323-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-2332-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-2406-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6048-2415-0x00000000013D0000-0x00000000013D1000-memory.dmp

    Filesize

    4KB

  • memory/6080-1448-0x000000003A200000-0x000000003A210000-memory.dmp

    Filesize

    64KB

  • memory/6080-1470-0x0000000000850000-0x0000000000851000-memory.dmp

    Filesize

    4KB

  • memory/6128-1864-0x00000000008E0000-0x00000000008E1000-memory.dmp

    Filesize

    4KB